Sep  4 18:47:45.977559 kernel: microcode: updated early: 0xf4 -> 0xfc, date = 2023-07-27
Sep  4 18:47:45.977573 kernel: Linux version 6.6.48-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.2.1_p20240210 p14) 13.2.1 20240210, GNU ld (Gentoo 2.41 p5) 2.41.0) #1 SMP PREEMPT_DYNAMIC Wed Sep  4 15:49:08 -00 2024
Sep  4 18:47:45.977579 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf
Sep  4 18:47:45.977585 kernel: BIOS-provided physical RAM map:
Sep  4 18:47:45.977589 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable
Sep  4 18:47:45.977592 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved
Sep  4 18:47:45.977597 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
Sep  4 18:47:45.977601 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable
Sep  4 18:47:45.977605 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved
Sep  4 18:47:45.977609 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819cefff] usable
Sep  4 18:47:45.977613 kernel: BIOS-e820: [mem 0x00000000819cf000-0x00000000819cffff] ACPI NVS
Sep  4 18:47:45.977618 kernel: BIOS-e820: [mem 0x00000000819d0000-0x00000000819d0fff] reserved
Sep  4 18:47:45.977622 kernel: BIOS-e820: [mem 0x00000000819d1000-0x000000008afccfff] usable
Sep  4 18:47:45.977626 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved
Sep  4 18:47:45.977631 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable
Sep  4 18:47:45.977636 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS
Sep  4 18:47:45.977641 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved
Sep  4 18:47:45.977646 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable
Sep  4 18:47:45.977650 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved
Sep  4 18:47:45.977655 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved
Sep  4 18:47:45.977659 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
Sep  4 18:47:45.977664 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
Sep  4 18:47:45.977668 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved
Sep  4 18:47:45.977673 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
Sep  4 18:47:45.977677 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable
Sep  4 18:47:45.977682 kernel: NX (Execute Disable) protection: active
Sep  4 18:47:45.977686 kernel: APIC: Static calls initialized
Sep  4 18:47:45.977691 kernel: SMBIOS 3.2.1 present.
Sep  4 18:47:45.977696 kernel: DMI: Supermicro SYS-5019C-MR/X11SCM-F, BIOS 1.9 09/16/2022
Sep  4 18:47:45.977701 kernel: tsc: Detected 3400.000 MHz processor
Sep  4 18:47:45.977706 kernel: tsc: Detected 3399.906 MHz TSC
Sep  4 18:47:45.977710 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Sep  4 18:47:45.977715 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Sep  4 18:47:45.977720 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000
Sep  4 18:47:45.977725 kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 23), built from 10 variable MTRRs
Sep  4 18:47:45.977730 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Sep  4 18:47:45.977734 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000
Sep  4 18:47:45.977739 kernel: Using GB pages for direct mapping
Sep  4 18:47:45.977745 kernel: ACPI: Early table checksum verification disabled
Sep  4 18:47:45.977750 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM)
Sep  4 18:47:45.977756 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM   01072009 AMI  00010013)
Sep  4 18:47:45.977761 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06                 01072009 AMI  00010013)
Sep  4 18:47:45.977766 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527)
Sep  4 18:47:45.977771 kernel: ACPI: FACS 0x000000008C66CF80 000040
Sep  4 18:47:45.977777 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04                 01072009 AMI  00010013)
Sep  4 18:47:45.977782 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01                 01072009 AMI  00010013)
Sep  4 18:47:45.977787 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI  00010013)
Sep  4 18:47:45.977792 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097)
Sep  4 18:47:45.977797 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000)
Sep  4 18:47:45.977801 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt  00003000 INTL 20160527)
Sep  4 18:47:45.977806 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt   00003000 INTL 20160527)
Sep  4 18:47:45.977812 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt  00001000 INTL 20160527)
Sep  4 18:47:45.977817 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977822 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527)
Sep  4 18:47:45.977827 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL  xh_mossb 00000000 INTL 20160527)
Sep  4 18:47:45.977832 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977837 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977842 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527)
Sep  4 18:47:45.977846 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527)
Sep  4 18:47:45.977851 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977857 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977862 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527)
Sep  4 18:47:45.977867 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL  EDK2     00000002      01000013)
Sep  4 18:47:45.977872 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel  ADebTabl 00001000 INTL 20160527)
Sep  4 18:47:45.977877 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI  00000000)
Sep  4 18:47:45.977882 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL  SpsNm    00000002 INTL 20160527)
Sep  4 18:47:45.977887 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM          01072009 AMI  00010013)
Sep  4 18:47:45.977892 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI    AMI.EINJ 00000000 AMI. 00000000)
Sep  4 18:47:45.977898 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER  AMI.ERST 00000000 AMI. 00000000)
Sep  4 18:47:45.977903 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI    AMI.BERT 00000000 AMI. 00000000)
Sep  4 18:47:45.977908 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI    AMI.HEST 00000000 AMI. 00000000)
Sep  4 18:47:45.977912 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN   00000000 INTL 20181221)
Sep  4 18:47:45.977917 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783]
Sep  4 18:47:45.977922 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b]
Sep  4 18:47:45.977927 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf]
Sep  4 18:47:45.977932 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3]
Sep  4 18:47:45.977937 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb]
Sep  4 18:47:45.977943 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b]
Sep  4 18:47:45.977948 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db]
Sep  4 18:47:45.977952 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20]
Sep  4 18:47:45.977957 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543]
Sep  4 18:47:45.977962 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d]
Sep  4 18:47:45.977967 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a]
Sep  4 18:47:45.977972 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77]
Sep  4 18:47:45.977977 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25]
Sep  4 18:47:45.977982 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b]
Sep  4 18:47:45.977987 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361]
Sep  4 18:47:45.977992 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb]
Sep  4 18:47:45.977997 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd]
Sep  4 18:47:45.978002 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1]
Sep  4 18:47:45.978007 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb]
Sep  4 18:47:45.978012 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153]
Sep  4 18:47:45.978016 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe]
Sep  4 18:47:45.978021 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f]
Sep  4 18:47:45.978026 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73]
Sep  4 18:47:45.978031 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab]
Sep  4 18:47:45.978037 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e]
Sep  4 18:47:45.978042 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67]
Sep  4 18:47:45.978046 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97]
Sep  4 18:47:45.978051 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7]
Sep  4 18:47:45.978056 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7]
Sep  4 18:47:45.978061 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273]
Sep  4 18:47:45.978066 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9]
Sep  4 18:47:45.978071 kernel: No NUMA configuration found
Sep  4 18:47:45.978076 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff]
Sep  4 18:47:45.978082 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff]
Sep  4 18:47:45.978087 kernel: Zone ranges:
Sep  4 18:47:45.978092 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Sep  4 18:47:45.978097 kernel:   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Sep  4 18:47:45.978101 kernel:   Normal   [mem 0x0000000100000000-0x000000086effffff]
Sep  4 18:47:45.978106 kernel: Movable zone start for each node
Sep  4 18:47:45.978111 kernel: Early memory node ranges
Sep  4 18:47:45.978116 kernel:   node   0: [mem 0x0000000000001000-0x0000000000098fff]
Sep  4 18:47:45.978121 kernel:   node   0: [mem 0x0000000000100000-0x000000003fffffff]
Sep  4 18:47:45.978127 kernel:   node   0: [mem 0x0000000040400000-0x00000000819cefff]
Sep  4 18:47:45.978132 kernel:   node   0: [mem 0x00000000819d1000-0x000000008afccfff]
Sep  4 18:47:45.978136 kernel:   node   0: [mem 0x000000008c0b2000-0x000000008c23afff]
Sep  4 18:47:45.978145 kernel:   node   0: [mem 0x000000008eeff000-0x000000008eefffff]
Sep  4 18:47:45.978153 kernel:   node   0: [mem 0x0000000100000000-0x000000086effffff]
Sep  4 18:47:45.978159 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff]
Sep  4 18:47:45.978165 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Sep  4 18:47:45.978170 kernel: On node 0, zone DMA: 103 pages in unavailable ranges
Sep  4 18:47:45.978176 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges
Sep  4 18:47:45.978181 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges
Sep  4 18:47:45.978187 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges
Sep  4 18:47:45.978192 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges
Sep  4 18:47:45.978197 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges
Sep  4 18:47:45.978202 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges
Sep  4 18:47:45.978208 kernel: ACPI: PM-Timer IO Port: 0x1808
Sep  4 18:47:45.978213 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
Sep  4 18:47:45.978218 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
Sep  4 18:47:45.978225 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
Sep  4 18:47:45.978230 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
Sep  4 18:47:45.978235 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1])
Sep  4 18:47:45.978240 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1])
Sep  4 18:47:45.978246 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1])
Sep  4 18:47:45.978251 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1])
Sep  4 18:47:45.978256 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1])
Sep  4 18:47:45.978261 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1])
Sep  4 18:47:45.978266 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1])
Sep  4 18:47:45.978272 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1])
Sep  4 18:47:45.978278 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1])
Sep  4 18:47:45.978283 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1])
Sep  4 18:47:45.978288 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1])
Sep  4 18:47:45.978293 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1])
Sep  4 18:47:45.978298 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
Sep  4 18:47:45.978304 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Sep  4 18:47:45.978309 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Sep  4 18:47:45.978314 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Sep  4 18:47:45.978319 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Sep  4 18:47:45.978326 kernel: TSC deadline timer available
Sep  4 18:47:45.978331 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs
Sep  4 18:47:45.978336 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices
Sep  4 18:47:45.978342 kernel: Booting paravirtualized kernel on bare hardware
Sep  4 18:47:45.978347 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Sep  4 18:47:45.978352 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1
Sep  4 18:47:45.978357 kernel: percpu: Embedded 58 pages/cpu s196904 r8192 d32472 u262144
Sep  4 18:47:45.978363 kernel: pcpu-alloc: s196904 r8192 d32472 u262144 alloc=1*2097152
Sep  4 18:47:45.978368 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 
Sep  4 18:47:45.978375 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf
Sep  4 18:47:45.978380 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Sep  4 18:47:45.978385 kernel: random: crng init done
Sep  4 18:47:45.978390 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear)
Sep  4 18:47:45.978396 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear)
Sep  4 18:47:45.978401 kernel: Fallback order for Node 0: 0 
Sep  4 18:47:45.978406 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 8232415
Sep  4 18:47:45.978411 kernel: Policy zone: Normal
Sep  4 18:47:45.978418 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Sep  4 18:47:45.978423 kernel: software IO TLB: area num 16.
Sep  4 18:47:45.978429 kernel: Memory: 32714168K/33452980K available (12288K kernel code, 2303K rwdata, 22640K rodata, 49336K init, 2008K bss, 738552K reserved, 0K cma-reserved)
Sep  4 18:47:45.978434 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1
Sep  4 18:47:45.978439 kernel: ftrace: allocating 37670 entries in 148 pages
Sep  4 18:47:45.978445 kernel: ftrace: allocated 148 pages with 3 groups
Sep  4 18:47:45.978450 kernel: Dynamic Preempt: voluntary
Sep  4 18:47:45.978455 kernel: rcu: Preemptible hierarchical RCU implementation.
Sep  4 18:47:45.978461 kernel: rcu:         RCU event tracing is enabled.
Sep  4 18:47:45.978467 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16.
Sep  4 18:47:45.978472 kernel:         Trampoline variant of Tasks RCU enabled.
Sep  4 18:47:45.978478 kernel:         Rude variant of Tasks RCU enabled.
Sep  4 18:47:45.978483 kernel:         Tracing variant of Tasks RCU enabled.
Sep  4 18:47:45.978488 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Sep  4 18:47:45.978493 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16
Sep  4 18:47:45.978499 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16
Sep  4 18:47:45.978504 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention.
Sep  4 18:47:45.978509 kernel: Console: colour dummy device 80x25
Sep  4 18:47:45.978515 kernel: printk: console [tty0] enabled
Sep  4 18:47:45.978521 kernel: printk: console [ttyS1] enabled
Sep  4 18:47:45.978526 kernel: ACPI: Core revision 20230628
Sep  4 18:47:45.978531 kernel: hpet: HPET dysfunctional in PC10. Force disabled.
Sep  4 18:47:45.978537 kernel: APIC: Switch to symmetric I/O mode setup
Sep  4 18:47:45.978542 kernel: DMAR: Host address width 39
Sep  4 18:47:45.978547 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1
Sep  4 18:47:45.978552 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da
Sep  4 18:47:45.978558 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff
Sep  4 18:47:45.978564 kernel: DMAR-IR: IOAPIC id 2 under DRHD base  0xfed91000 IOMMU 0
Sep  4 18:47:45.978569 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000
Sep  4 18:47:45.978574 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping.
Sep  4 18:47:45.978580 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode
Sep  4 18:47:45.978585 kernel: x2apic enabled
Sep  4 18:47:45.978590 kernel: APIC: Switched APIC routing to: cluster x2apic
Sep  4 18:47:45.978596 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns
Sep  4 18:47:45.978601 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906)
Sep  4 18:47:45.978606 kernel: CPU0: Thermal monitoring enabled (TM1)
Sep  4 18:47:45.978612 kernel: process: using mwait in idle threads
Sep  4 18:47:45.978618 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Sep  4 18:47:45.978623 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Sep  4 18:47:45.978628 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Sep  4 18:47:45.978633 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit
Sep  4 18:47:45.978639 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall
Sep  4 18:47:45.978644 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS
Sep  4 18:47:45.978649 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Sep  4 18:47:45.978654 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT
Sep  4 18:47:45.978659 kernel: RETBleed: Mitigation: Enhanced IBRS
Sep  4 18:47:45.978664 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Sep  4 18:47:45.978670 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl
Sep  4 18:47:45.978676 kernel: TAA: Mitigation: TSX disabled
Sep  4 18:47:45.978681 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers
Sep  4 18:47:45.978686 kernel: SRBDS: Mitigation: Microcode
Sep  4 18:47:45.978691 kernel: GDS: Mitigation: Microcode
Sep  4 18:47:45.978696 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Sep  4 18:47:45.978702 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Sep  4 18:47:45.978707 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Sep  4 18:47:45.978712 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Sep  4 18:47:45.978717 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Sep  4 18:47:45.978722 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Sep  4 18:47:45.978728 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Sep  4 18:47:45.978733 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Sep  4 18:47:45.978739 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format.
Sep  4 18:47:45.978744 kernel: Freeing SMP alternatives memory: 32K
Sep  4 18:47:45.978749 kernel: pid_max: default: 32768 minimum: 301
Sep  4 18:47:45.978754 kernel: LSM: initializing lsm=lockdown,capability,selinux,integrity
Sep  4 18:47:45.978759 kernel: SELinux:  Initializing.
Sep  4 18:47:45.978765 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Sep  4 18:47:45.978770 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Sep  4 18:47:45.978775 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd)
Sep  4 18:47:45.978780 kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
Sep  4 18:47:45.978787 kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
Sep  4 18:47:45.978792 kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
Sep  4 18:47:45.978797 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver.
Sep  4 18:47:45.978802 kernel: ... version:                4
Sep  4 18:47:45.978808 kernel: ... bit width:              48
Sep  4 18:47:45.978813 kernel: ... generic registers:      4
Sep  4 18:47:45.978818 kernel: ... value mask:             0000ffffffffffff
Sep  4 18:47:45.978823 kernel: ... max period:             00007fffffffffff
Sep  4 18:47:45.978829 kernel: ... fixed-purpose events:   3
Sep  4 18:47:45.978835 kernel: ... event mask:             000000070000000f
Sep  4 18:47:45.978840 kernel: signal: max sigframe size: 2032
Sep  4 18:47:45.978845 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445
Sep  4 18:47:45.978851 kernel: rcu: Hierarchical SRCU implementation.
Sep  4 18:47:45.978856 kernel: rcu:         Max phase no-delay instances is 400.
Sep  4 18:47:45.978861 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter.
Sep  4 18:47:45.978866 kernel: smp: Bringing up secondary CPUs ...
Sep  4 18:47:45.978871 kernel: smpboot: x86: Booting SMP configuration:
Sep  4 18:47:45.978877 kernel: .... node  #0, CPUs:        #1  #2  #3  #4  #5  #6  #7  #8  #9 #10 #11 #12 #13 #14 #15
Sep  4 18:47:45.978883 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Sep  4 18:47:45.978889 kernel: smp: Brought up 1 node, 16 CPUs
Sep  4 18:47:45.978894 kernel: smpboot: Max logical packages: 1
Sep  4 18:47:45.978899 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS)
Sep  4 18:47:45.978904 kernel: devtmpfs: initialized
Sep  4 18:47:45.978910 kernel: x86/mm: Memory block size: 128MB
Sep  4 18:47:45.978915 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819cf000-0x819cffff] (4096 bytes)
Sep  4 18:47:45.978920 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes)
Sep  4 18:47:45.978926 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Sep  4 18:47:45.978932 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear)
Sep  4 18:47:45.978937 kernel: pinctrl core: initialized pinctrl subsystem
Sep  4 18:47:45.978943 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Sep  4 18:47:45.978948 kernel: audit: initializing netlink subsys (disabled)
Sep  4 18:47:45.978953 kernel: audit: type=2000 audit(1725475660.040:1): state=initialized audit_enabled=0 res=1
Sep  4 18:47:45.978958 kernel: thermal_sys: Registered thermal governor 'step_wise'
Sep  4 18:47:45.978963 kernel: thermal_sys: Registered thermal governor 'user_space'
Sep  4 18:47:45.978969 kernel: cpuidle: using governor menu
Sep  4 18:47:45.978974 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Sep  4 18:47:45.978980 kernel: dca service started, version 1.12.1
Sep  4 18:47:45.978985 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000)
Sep  4 18:47:45.978991 kernel: PCI: Using configuration type 1 for base access
Sep  4 18:47:45.978996 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance'
Sep  4 18:47:45.979001 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Sep  4 18:47:45.979006 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages
Sep  4 18:47:45.979012 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page
Sep  4 18:47:45.979017 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages
Sep  4 18:47:45.979023 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page
Sep  4 18:47:45.979028 kernel: ACPI: Added _OSI(Module Device)
Sep  4 18:47:45.979033 kernel: ACPI: Added _OSI(Processor Device)
Sep  4 18:47:45.979039 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Sep  4 18:47:45.979044 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Sep  4 18:47:45.979049 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded
Sep  4 18:47:45.979054 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979060 kernel: ACPI: SSDT 0xFFFFA0F880E46C00 000400 (v02 PmRef  Cpu0Cst  00003001 INTL 20160527)
Sep  4 18:47:45.979065 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979070 kernel: ACPI: SSDT 0xFFFFA0F881E11800 000683 (v02 PmRef  Cpu0Ist  00003000 INTL 20160527)
Sep  4 18:47:45.979076 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979082 kernel: ACPI: SSDT 0xFFFFA0F880DEAE00 0000F4 (v02 PmRef  Cpu0Psd  00003000 INTL 20160527)
Sep  4 18:47:45.979087 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979092 kernel: ACPI: SSDT 0xFFFFA0F881EC2000 0005FC (v02 PmRef  ApIst    00003000 INTL 20160527)
Sep  4 18:47:45.979097 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979102 kernel: ACPI: SSDT 0xFFFFA0F881ECA000 000AB0 (v02 PmRef  ApPsd    00003000 INTL 20160527)
Sep  4 18:47:45.979107 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979113 kernel: ACPI: SSDT 0xFFFFA0F881ED4800 00030A (v02 PmRef  ApCst    00003000 INTL 20160527)
Sep  4 18:47:45.979118 kernel: ACPI: _OSC evaluated successfully for all CPUs
Sep  4 18:47:45.979124 kernel: ACPI: Interpreter enabled
Sep  4 18:47:45.979130 kernel: ACPI: PM: (supports S0 S5)
Sep  4 18:47:45.979135 kernel: ACPI: Using IOAPIC for interrupt routing
Sep  4 18:47:45.979147 kernel: HEST: Enabling Firmware First mode for corrected errors.
Sep  4 18:47:45.979153 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14.
Sep  4 18:47:45.979158 kernel: HEST: Table parsing has been initialized.
Sep  4 18:47:45.979163 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC.
Sep  4 18:47:45.979169 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Sep  4 18:47:45.979174 kernel: PCI: Using E820 reservations for host bridge windows
Sep  4 18:47:45.979180 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F
Sep  4 18:47:45.979186 kernel: ACPI: \_SB_.PCI0.XDCI.USBC: New power resource
Sep  4 18:47:45.979191 kernel: ACPI: \_SB_.PCI0.SAT0.VOL0.V0PR: New power resource
Sep  4 18:47:45.979197 kernel: ACPI: \_SB_.PCI0.SAT0.VOL1.V1PR: New power resource
Sep  4 18:47:45.979202 kernel: ACPI: \_SB_.PCI0.SAT0.VOL2.V2PR: New power resource
Sep  4 18:47:45.979207 kernel: ACPI: \_SB_.PCI0.CNVW.WRST: New power resource
Sep  4 18:47:45.979212 kernel: ACPI: \_TZ_.FN00: New power resource
Sep  4 18:47:45.979218 kernel: ACPI: \_TZ_.FN01: New power resource
Sep  4 18:47:45.979223 kernel: ACPI: \_TZ_.FN02: New power resource
Sep  4 18:47:45.979229 kernel: ACPI: \_TZ_.FN03: New power resource
Sep  4 18:47:45.979234 kernel: ACPI: \_TZ_.FN04: New power resource
Sep  4 18:47:45.979240 kernel: ACPI: \PIN_: New power resource
Sep  4 18:47:45.979245 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
Sep  4 18:47:45.979316 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
Sep  4 18:47:45.979368 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER]
Sep  4 18:47:45.979414 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR]
Sep  4 18:47:45.979422 kernel: PCI host bridge to bus 0000:00
Sep  4 18:47:45.979474 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Sep  4 18:47:45.979516 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Sep  4 18:47:45.979557 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Sep  4 18:47:45.979598 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window]
Sep  4 18:47:45.979638 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window]
Sep  4 18:47:45.979679 kernel: pci_bus 0000:00: root bus resource [bus 00-fe]
Sep  4 18:47:45.979737 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000
Sep  4 18:47:45.979795 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400
Sep  4 18:47:45.979845 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.979897 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000
Sep  4 18:47:45.979945 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit]
Sep  4 18:47:45.979997 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000
Sep  4 18:47:45.980046 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit]
Sep  4 18:47:45.980098 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330
Sep  4 18:47:45.980153 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit]
Sep  4 18:47:45.980203 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold
Sep  4 18:47:45.980254 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000
Sep  4 18:47:45.980301 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit]
Sep  4 18:47:45.980347 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit]
Sep  4 18:47:45.980400 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000
Sep  4 18:47:45.980447 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Sep  4 18:47:45.980500 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000
Sep  4 18:47:45.980547 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Sep  4 18:47:45.980599 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000
Sep  4 18:47:45.980645 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit]
Sep  4 18:47:45.980694 kernel: pci 0000:00:16.0: PME# supported from D3hot
Sep  4 18:47:45.980744 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000
Sep  4 18:47:45.980798 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit]
Sep  4 18:47:45.980848 kernel: pci 0000:00:16.1: PME# supported from D3hot
Sep  4 18:47:45.980897 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000
Sep  4 18:47:45.980945 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit]
Sep  4 18:47:45.980993 kernel: pci 0000:00:16.4: PME# supported from D3hot
Sep  4 18:47:45.981045 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601
Sep  4 18:47:45.981091 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff]
Sep  4 18:47:45.981138 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff]
Sep  4 18:47:45.981187 kernel: pci 0000:00:17.0: reg 0x18: [io  0x6050-0x6057]
Sep  4 18:47:45.981236 kernel: pci 0000:00:17.0: reg 0x1c: [io  0x6040-0x6043]
Sep  4 18:47:45.981281 kernel: pci 0000:00:17.0: reg 0x20: [io  0x6020-0x603f]
Sep  4 18:47:45.981328 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff]
Sep  4 18:47:45.981377 kernel: pci 0000:00:17.0: PME# supported from D3hot
Sep  4 18:47:45.981431 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400
Sep  4 18:47:45.981478 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981534 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400
Sep  4 18:47:45.981584 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981636 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400
Sep  4 18:47:45.981686 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981737 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400
Sep  4 18:47:45.981786 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981839 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400
Sep  4 18:47:45.981888 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981940 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000
Sep  4 18:47:45.981988 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Sep  4 18:47:45.982039 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100
Sep  4 18:47:45.982090 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500
Sep  4 18:47:45.982142 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit]
Sep  4 18:47:45.982192 kernel: pci 0000:00:1f.4: reg 0x20: [io  0xefa0-0xefbf]
Sep  4 18:47:45.982245 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000
Sep  4 18:47:45.982293 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff]
Sep  4 18:47:45.982348 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000
Sep  4 18:47:45.982397 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref]
Sep  4 18:47:45.982446 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref]
Sep  4 18:47:45.982497 kernel: pci 0000:01:00.0: PME# supported from D3cold
Sep  4 18:47:45.982547 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref]
Sep  4 18:47:45.982595 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs)
Sep  4 18:47:45.982648 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000
Sep  4 18:47:45.982697 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref]
Sep  4 18:47:45.982745 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref]
Sep  4 18:47:45.982794 kernel: pci 0000:01:00.1: PME# supported from D3cold
Sep  4 18:47:45.982844 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref]
Sep  4 18:47:45.982896 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs)
Sep  4 18:47:45.982944 kernel: pci 0000:00:01.0: PCI bridge to [bus 01]
Sep  4 18:47:45.982992 kernel: pci 0000:00:01.0:   bridge window [mem 0x95100000-0x952fffff]
Sep  4 18:47:45.983040 kernel: pci 0000:00:01.0:   bridge window [mem 0x90000000-0x93ffffff 64bit pref]
Sep  4 18:47:45.983088 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02]
Sep  4 18:47:45.983143 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect
Sep  4 18:47:45.983197 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000
Sep  4 18:47:45.983247 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff]
Sep  4 18:47:45.983295 kernel: pci 0000:03:00.0: reg 0x18: [io  0x5000-0x501f]
Sep  4 18:47:45.983344 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff]
Sep  4 18:47:45.983391 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.983440 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03]
Sep  4 18:47:45.983486 kernel: pci 0000:00:1b.4:   bridge window [io  0x5000-0x5fff]
Sep  4 18:47:45.983533 kernel: pci 0000:00:1b.4:   bridge window [mem 0x95400000-0x954fffff]
Sep  4 18:47:45.983588 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect
Sep  4 18:47:45.983639 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000
Sep  4 18:47:45.983687 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff]
Sep  4 18:47:45.983736 kernel: pci 0000:04:00.0: reg 0x18: [io  0x4000-0x401f]
Sep  4 18:47:45.983785 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff]
Sep  4 18:47:45.983832 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.983881 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04]
Sep  4 18:47:45.983931 kernel: pci 0000:00:1b.5:   bridge window [io  0x4000-0x4fff]
Sep  4 18:47:45.983979 kernel: pci 0000:00:1b.5:   bridge window [mem 0x95300000-0x953fffff]
Sep  4 18:47:45.984027 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05]
Sep  4 18:47:45.984081 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400
Sep  4 18:47:45.984130 kernel: pci 0000:06:00.0: enabling Extended Tags
Sep  4 18:47:45.984183 kernel: pci 0000:06:00.0: supports D1 D2
Sep  4 18:47:45.984232 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Sep  4 18:47:45.984280 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07]
Sep  4 18:47:45.984330 kernel: pci 0000:00:1c.3:   bridge window [io  0x3000-0x3fff]
Sep  4 18:47:45.984378 kernel: pci 0000:00:1c.3:   bridge window [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.984433 kernel: pci_bus 0000:07: extended config space not accessible
Sep  4 18:47:45.984488 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000
Sep  4 18:47:45.984541 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff]
Sep  4 18:47:45.984591 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff]
Sep  4 18:47:45.984642 kernel: pci 0000:07:00.0: reg 0x18: [io  0x3000-0x307f]
Sep  4 18:47:45.984695 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Sep  4 18:47:45.984745 kernel: pci 0000:07:00.0: supports D1 D2
Sep  4 18:47:45.984796 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Sep  4 18:47:45.984844 kernel: pci 0000:06:00.0: PCI bridge to [bus 07]
Sep  4 18:47:45.984893 kernel: pci 0000:06:00.0:   bridge window [io  0x3000-0x3fff]
Sep  4 18:47:45.984943 kernel: pci 0000:06:00.0:   bridge window [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.984951 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0
Sep  4 18:47:45.984959 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1
Sep  4 18:47:45.984965 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0
Sep  4 18:47:45.984971 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0
Sep  4 18:47:45.984976 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0
Sep  4 18:47:45.984982 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0
Sep  4 18:47:45.984987 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0
Sep  4 18:47:45.984993 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0
Sep  4 18:47:45.984999 kernel: iommu: Default domain type: Translated
Sep  4 18:47:45.985004 kernel: iommu: DMA domain TLB invalidation policy: lazy mode
Sep  4 18:47:45.985011 kernel: PCI: Using ACPI for IRQ routing
Sep  4 18:47:45.985017 kernel: PCI: pci_cache_line_size set to 64 bytes
Sep  4 18:47:45.985022 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff]
Sep  4 18:47:45.985028 kernel: e820: reserve RAM buffer [mem 0x819cf000-0x83ffffff]
Sep  4 18:47:45.985033 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff]
Sep  4 18:47:45.985038 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff]
Sep  4 18:47:45.985044 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff]
Sep  4 18:47:45.985049 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff]
Sep  4 18:47:45.985098 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device
Sep  4 18:47:45.985154 kernel: pci 0000:07:00.0: vgaarb: bridge control possible
Sep  4 18:47:45.985205 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Sep  4 18:47:45.985214 kernel: vgaarb: loaded
Sep  4 18:47:45.985220 kernel: clocksource: Switched to clocksource tsc-early
Sep  4 18:47:45.985225 kernel: VFS: Disk quotas dquot_6.6.0
Sep  4 18:47:45.985231 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Sep  4 18:47:45.985238 kernel: pnp: PnP ACPI init
Sep  4 18:47:45.985290 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved
Sep  4 18:47:45.985339 kernel: pnp 00:02: [dma 0 disabled]
Sep  4 18:47:45.985387 kernel: pnp 00:03: [dma 0 disabled]
Sep  4 18:47:45.985436 kernel: system 00:04: [io  0x0680-0x069f] has been reserved
Sep  4 18:47:45.985481 kernel: system 00:04: [io  0x164e-0x164f] has been reserved
Sep  4 18:47:45.985528 kernel: system 00:05: [io  0x1854-0x1857] has been reserved
Sep  4 18:47:45.985573 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved
Sep  4 18:47:45.985620 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved
Sep  4 18:47:45.985662 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved
Sep  4 18:47:45.985705 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved
Sep  4 18:47:45.985747 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved
Sep  4 18:47:45.985790 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved
Sep  4 18:47:45.985832 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved
Sep  4 18:47:45.985875 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved
Sep  4 18:47:45.985921 kernel: system 00:07: [io  0x1800-0x18fe] could not be reserved
Sep  4 18:47:45.985968 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved
Sep  4 18:47:45.986013 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved
Sep  4 18:47:45.986057 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved
Sep  4 18:47:45.986099 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved
Sep  4 18:47:45.986146 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved
Sep  4 18:47:45.986189 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved
Sep  4 18:47:45.986239 kernel: system 00:08: [io  0x2000-0x20fe] has been reserved
Sep  4 18:47:45.986248 kernel: pnp: PnP ACPI: found 10 devices
Sep  4 18:47:45.986254 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Sep  4 18:47:45.986259 kernel: NET: Registered PF_INET protocol family
Sep  4 18:47:45.986265 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Sep  4 18:47:45.986271 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear)
Sep  4 18:47:45.986277 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Sep  4 18:47:45.986282 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Sep  4 18:47:45.986290 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear)
Sep  4 18:47:45.986295 kernel: TCP: Hash tables configured (established 262144 bind 65536)
Sep  4 18:47:45.986301 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear)
Sep  4 18:47:45.986306 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear)
Sep  4 18:47:45.986312 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Sep  4 18:47:45.986318 kernel: NET: Registered PF_XDP protocol family
Sep  4 18:47:45.986366 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit]
Sep  4 18:47:45.986415 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit]
Sep  4 18:47:45.986464 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit]
Sep  4 18:47:45.986517 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref]
Sep  4 18:47:45.986567 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref]
Sep  4 18:47:45.986617 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref]
Sep  4 18:47:45.986667 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref]
Sep  4 18:47:45.986715 kernel: pci 0000:00:01.0: PCI bridge to [bus 01]
Sep  4 18:47:45.986763 kernel: pci 0000:00:01.0:   bridge window [mem 0x95100000-0x952fffff]
Sep  4 18:47:45.986810 kernel: pci 0000:00:01.0:   bridge window [mem 0x90000000-0x93ffffff 64bit pref]
Sep  4 18:47:45.986859 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02]
Sep  4 18:47:45.986909 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03]
Sep  4 18:47:45.986956 kernel: pci 0000:00:1b.4:   bridge window [io  0x5000-0x5fff]
Sep  4 18:47:45.987004 kernel: pci 0000:00:1b.4:   bridge window [mem 0x95400000-0x954fffff]
Sep  4 18:47:45.987051 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04]
Sep  4 18:47:45.987099 kernel: pci 0000:00:1b.5:   bridge window [io  0x4000-0x4fff]
Sep  4 18:47:45.987151 kernel: pci 0000:00:1b.5:   bridge window [mem 0x95300000-0x953fffff]
Sep  4 18:47:45.987199 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05]
Sep  4 18:47:45.987248 kernel: pci 0000:06:00.0: PCI bridge to [bus 07]
Sep  4 18:47:45.987297 kernel: pci 0000:06:00.0:   bridge window [io  0x3000-0x3fff]
Sep  4 18:47:45.987346 kernel: pci 0000:06:00.0:   bridge window [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.987395 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07]
Sep  4 18:47:45.987442 kernel: pci 0000:00:1c.3:   bridge window [io  0x3000-0x3fff]
Sep  4 18:47:45.987493 kernel: pci 0000:00:1c.3:   bridge window [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.987536 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc
Sep  4 18:47:45.987582 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Sep  4 18:47:45.987624 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Sep  4 18:47:45.987665 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Sep  4 18:47:45.987706 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window]
Sep  4 18:47:45.987748 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window]
Sep  4 18:47:45.987797 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff]
Sep  4 18:47:45.987841 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref]
Sep  4 18:47:45.987894 kernel: pci_bus 0000:03: resource 0 [io  0x5000-0x5fff]
Sep  4 18:47:45.987938 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff]
Sep  4 18:47:45.987987 kernel: pci_bus 0000:04: resource 0 [io  0x4000-0x4fff]
Sep  4 18:47:45.988030 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff]
Sep  4 18:47:45.988078 kernel: pci_bus 0000:06: resource 0 [io  0x3000-0x3fff]
Sep  4 18:47:45.988121 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.988173 kernel: pci_bus 0000:07: resource 0 [io  0x3000-0x3fff]
Sep  4 18:47:45.988218 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.988226 kernel: PCI: CLS 64 bytes, default 64
Sep  4 18:47:45.988232 kernel: DMAR: No ATSR found
Sep  4 18:47:45.988238 kernel: DMAR: No SATC found
Sep  4 18:47:45.988244 kernel: DMAR: dmar0: Using Queued invalidation
Sep  4 18:47:45.988292 kernel: pci 0000:00:00.0: Adding to iommu group 0
Sep  4 18:47:45.988340 kernel: pci 0000:00:01.0: Adding to iommu group 1
Sep  4 18:47:45.988390 kernel: pci 0000:00:08.0: Adding to iommu group 2
Sep  4 18:47:45.988437 kernel: pci 0000:00:12.0: Adding to iommu group 3
Sep  4 18:47:45.988485 kernel: pci 0000:00:14.0: Adding to iommu group 4
Sep  4 18:47:45.988533 kernel: pci 0000:00:14.2: Adding to iommu group 4
Sep  4 18:47:45.988580 kernel: pci 0000:00:15.0: Adding to iommu group 5
Sep  4 18:47:45.988628 kernel: pci 0000:00:15.1: Adding to iommu group 5
Sep  4 18:47:45.988676 kernel: pci 0000:00:16.0: Adding to iommu group 6
Sep  4 18:47:45.988724 kernel: pci 0000:00:16.1: Adding to iommu group 6
Sep  4 18:47:45.988773 kernel: pci 0000:00:16.4: Adding to iommu group 6
Sep  4 18:47:45.988820 kernel: pci 0000:00:17.0: Adding to iommu group 7
Sep  4 18:47:45.988867 kernel: pci 0000:00:1b.0: Adding to iommu group 8
Sep  4 18:47:45.988915 kernel: pci 0000:00:1b.4: Adding to iommu group 9
Sep  4 18:47:45.988962 kernel: pci 0000:00:1b.5: Adding to iommu group 10
Sep  4 18:47:45.989009 kernel: pci 0000:00:1c.0: Adding to iommu group 11
Sep  4 18:47:45.989055 kernel: pci 0000:00:1c.3: Adding to iommu group 12
Sep  4 18:47:45.989103 kernel: pci 0000:00:1e.0: Adding to iommu group 13
Sep  4 18:47:45.989153 kernel: pci 0000:00:1f.0: Adding to iommu group 14
Sep  4 18:47:45.989203 kernel: pci 0000:00:1f.4: Adding to iommu group 14
Sep  4 18:47:45.989251 kernel: pci 0000:00:1f.5: Adding to iommu group 14
Sep  4 18:47:45.989300 kernel: pci 0000:01:00.0: Adding to iommu group 1
Sep  4 18:47:45.989351 kernel: pci 0000:01:00.1: Adding to iommu group 1
Sep  4 18:47:45.989399 kernel: pci 0000:03:00.0: Adding to iommu group 15
Sep  4 18:47:45.989449 kernel: pci 0000:04:00.0: Adding to iommu group 16
Sep  4 18:47:45.989498 kernel: pci 0000:06:00.0: Adding to iommu group 17
Sep  4 18:47:45.989549 kernel: pci 0000:07:00.0: Adding to iommu group 17
Sep  4 18:47:45.989559 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O
Sep  4 18:47:45.989565 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Sep  4 18:47:45.989571 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB)
Sep  4 18:47:45.989577 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer
Sep  4 18:47:45.989582 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules
Sep  4 18:47:45.989588 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules
Sep  4 18:47:45.989594 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules
Sep  4 18:47:45.989644 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found)
Sep  4 18:47:45.989654 kernel: Initialise system trusted keyrings
Sep  4 18:47:45.989660 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0
Sep  4 18:47:45.989665 kernel: Key type asymmetric registered
Sep  4 18:47:45.989671 kernel: Asymmetric key parser 'x509' registered
Sep  4 18:47:45.989676 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251)
Sep  4 18:47:45.989682 kernel: io scheduler mq-deadline registered
Sep  4 18:47:45.989688 kernel: io scheduler kyber registered
Sep  4 18:47:45.989693 kernel: io scheduler bfq registered
Sep  4 18:47:45.989741 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121
Sep  4 18:47:45.989792 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122
Sep  4 18:47:45.989841 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123
Sep  4 18:47:45.989890 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124
Sep  4 18:47:45.989937 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125
Sep  4 18:47:45.989985 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126
Sep  4 18:47:45.990037 kernel: thermal LNXTHERM:00: registered as thermal_zone0
Sep  4 18:47:45.990046 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C)
Sep  4 18:47:45.990053 kernel: ERST: Error Record Serialization Table (ERST) support is initialized.
Sep  4 18:47:45.990059 kernel: pstore: Using crash dump compression: deflate
Sep  4 18:47:45.990065 kernel: pstore: Registered erst as persistent store backend
Sep  4 18:47:45.990070 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Sep  4 18:47:45.990076 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Sep  4 18:47:45.990082 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Sep  4 18:47:45.990087 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Sep  4 18:47:45.990093 kernel: hpet_acpi_add: no address or irqs in _CRS
Sep  4 18:47:45.990147 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16)
Sep  4 18:47:45.990157 kernel: i8042: PNP: No PS/2 controller found.
Sep  4 18:47:45.990200 kernel: rtc_cmos rtc_cmos: RTC can wake from S4
Sep  4 18:47:45.990245 kernel: rtc_cmos rtc_cmos: registered as rtc0
Sep  4 18:47:45.990289 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-09-04T18:47:44 UTC (1725475664)
Sep  4 18:47:45.990333 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram
Sep  4 18:47:45.990341 kernel: intel_pstate: Intel P-state driver initializing
Sep  4 18:47:45.990347 kernel: intel_pstate: Disabling energy efficiency optimization
Sep  4 18:47:45.990354 kernel: intel_pstate: HWP enabled
Sep  4 18:47:45.990360 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0
Sep  4 18:47:45.990365 kernel: vesafb: scrolling: redraw
Sep  4 18:47:45.990371 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0
Sep  4 18:47:45.990377 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000006a250863, using 768k, total 768k
Sep  4 18:47:45.990382 kernel: Console: switching to colour frame buffer device 128x48
Sep  4 18:47:45.990388 kernel: fb0: VESA VGA frame buffer device
Sep  4 18:47:45.990393 kernel: NET: Registered PF_INET6 protocol family
Sep  4 18:47:45.990399 kernel: Segment Routing with IPv6
Sep  4 18:47:45.990404 kernel: In-situ OAM (IOAM) with IPv6
Sep  4 18:47:45.990411 kernel: NET: Registered PF_PACKET protocol family
Sep  4 18:47:45.990417 kernel: Key type dns_resolver registered
Sep  4 18:47:45.990422 kernel: microcode: Microcode Update Driver: v2.2.
Sep  4 18:47:45.990428 kernel: IPI shorthand broadcast: enabled
Sep  4 18:47:45.990433 kernel: sched_clock: Marking stable (2537000541, 1380259331)->(4451082000, -533822128)
Sep  4 18:47:45.990439 kernel: registered taskstats version 1
Sep  4 18:47:45.990445 kernel: Loading compiled-in X.509 certificates
Sep  4 18:47:45.990450 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.6.48-flatcar: a53bb4e7e3319f75620f709d8a6c7aef0adb3b02'
Sep  4 18:47:45.990456 kernel: Key type .fscrypt registered
Sep  4 18:47:45.990462 kernel: Key type fscrypt-provisioning registered
Sep  4 18:47:45.990468 kernel: ima: Allocated hash algorithm: sha1
Sep  4 18:47:45.990473 kernel: ima: No architecture policies found
Sep  4 18:47:45.990479 kernel: clk: Disabling unused clocks
Sep  4 18:47:45.990485 kernel: Freeing unused kernel image (initmem) memory: 49336K
Sep  4 18:47:45.990490 kernel: Write protecting the kernel read-only data: 36864k
Sep  4 18:47:45.990496 kernel: Freeing unused kernel image (rodata/data gap) memory: 1936K
Sep  4 18:47:45.990502 kernel: Run /init as init process
Sep  4 18:47:45.990508 kernel:   with arguments:
Sep  4 18:47:45.990514 kernel:     /init
Sep  4 18:47:45.990519 kernel:   with environment:
Sep  4 18:47:45.990525 kernel:     HOME=/
Sep  4 18:47:45.990530 kernel:     TERM=linux
Sep  4 18:47:45.990536 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Sep  4 18:47:45.990542 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified)
Sep  4 18:47:45.990549 systemd[1]: Detected architecture x86-64.
Sep  4 18:47:45.990557 systemd[1]: Running in initrd.
Sep  4 18:47:45.990562 systemd[1]: No hostname configured, using default hostname.
Sep  4 18:47:45.990568 systemd[1]: Hostname set to <localhost>.
Sep  4 18:47:45.990574 systemd[1]: Initializing machine ID from random generator.
Sep  4 18:47:45.990580 systemd[1]: Queued start job for default target initrd.target.
Sep  4 18:47:45.990586 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch.
Sep  4 18:47:45.990592 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch.
Sep  4 18:47:45.990598 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM...
Sep  4 18:47:45.990605 systemd[1]: Expecting device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT...
Sep  4 18:47:45.990611 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-ROOT.device - /dev/disk/by-partlabel/ROOT...
Sep  4 18:47:45.990617 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A...
Sep  4 18:47:45.990623 systemd[1]: Expecting device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132...
Sep  4 18:47:45.990629 systemd[1]: Expecting device dev-mapper-usr.device - /dev/mapper/usr...
Sep  4 18:47:45.990635 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz
Sep  4 18:47:45.990641 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns
Sep  4 18:47:45.990648 kernel: clocksource: Switched to clocksource tsc
Sep  4 18:47:45.990653 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre).
Sep  4 18:47:45.990659 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Sep  4 18:47:45.990665 systemd[1]: Reached target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup.
Sep  4 18:47:45.990671 systemd[1]: Reached target paths.target - Path Units.
Sep  4 18:47:45.990677 systemd[1]: Reached target slices.target - Slice Units.
Sep  4 18:47:45.990683 systemd[1]: Reached target swap.target - Swaps.
Sep  4 18:47:45.990689 systemd[1]: Reached target timers.target - Timer Units.
Sep  4 18:47:45.990695 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket.
Sep  4 18:47:45.990702 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket.
Sep  4 18:47:45.990707 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log).
Sep  4 18:47:45.990713 systemd[1]: Listening on systemd-journald.socket - Journal Socket.
Sep  4 18:47:45.990719 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
Sep  4 18:47:45.990725 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
Sep  4 18:47:45.990731 systemd[1]: Reached target sockets.target - Socket Units.
Sep  4 18:47:45.990737 systemd[1]: Starting ignition-setup-pre.service - Ignition env setup...
Sep  4 18:47:45.990743 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
Sep  4 18:47:45.990750 systemd[1]: Starting systemd-fsck-usr.service...
Sep  4 18:47:45.990756 systemd[1]: Starting systemd-journald.service - Journal Service...
Sep  4 18:47:45.990772 systemd-journald[260]: Collecting audit messages is disabled.
Sep  4 18:47:45.990785 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
Sep  4 18:47:45.990793 systemd-journald[260]: Journal started
Sep  4 18:47:45.990807 systemd-journald[260]: Runtime Journal (/run/log/journal/d55241cd9f0746bca9ee0ac964166eb2) is 8.0M, max 639.9M, 631.9M free.
Sep  4 18:47:46.006943 systemd-modules-load[262]: Inserted module 'overlay'
Sep  4 18:47:46.038176 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup...
Sep  4 18:47:46.081188 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Sep  4 18:47:46.081205 systemd[1]: Started systemd-journald.service - Journal Service.
Sep  4 18:47:46.100420 systemd[1]: Finished ignition-setup-pre.service - Ignition env setup.
Sep  4 18:47:46.117838 systemd-modules-load[262]: Inserted module 'br_netfilter'
Sep  4 18:47:46.118142 kernel: Bridge firewalling registered
Sep  4 18:47:46.142554 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
Sep  4 18:47:46.154456 systemd[1]: Finished systemd-fsck-usr.service.
Sep  4 18:47:46.166519 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
Sep  4 18:47:46.191516 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:46.236389 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters...
Sep  4 18:47:46.236915 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
Sep  4 18:47:46.237362 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully...
Sep  4 18:47:46.237856 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
Sep  4 18:47:46.242553 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully.
Sep  4 18:47:46.243390 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
Sep  4 18:47:46.243496 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
Sep  4 18:47:46.244350 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Sep  4 18:47:46.246563 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters.
Sep  4 18:47:46.288544 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Sep  4 18:47:46.310578 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook...
Sep  4 18:47:46.365173 dracut-cmdline[300]: dracut-dracut-053
Sep  4 18:47:46.373373 dracut-cmdline[300]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf
Sep  4 18:47:46.575171 kernel: SCSI subsystem initialized
Sep  4 18:47:46.598171 kernel: Loading iSCSI transport class v2.0-870.
Sep  4 18:47:46.623191 kernel: iscsi: registered transport (tcp)
Sep  4 18:47:46.657237 kernel: iscsi: registered transport (qla4xxx)
Sep  4 18:47:46.657253 kernel: QLogic iSCSI HBA Driver
Sep  4 18:47:46.690457 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook.
Sep  4 18:47:46.709445 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook...
Sep  4 18:47:46.797238 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Sep  4 18:47:46.797259 kernel: device-mapper: uevent: version 1.0.3
Sep  4 18:47:46.817204 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@redhat.com
Sep  4 18:47:46.878216 kernel: raid6: avx2x4   gen() 51602 MB/s
Sep  4 18:47:46.910221 kernel: raid6: avx2x2   gen() 51900 MB/s
Sep  4 18:47:46.946983 kernel: raid6: avx2x1   gen() 44359 MB/s
Sep  4 18:47:46.947000 kernel: raid6: using algorithm avx2x2 gen() 51900 MB/s
Sep  4 18:47:46.994941 kernel: raid6: .... xor() 30370 MB/s, rmw enabled
Sep  4 18:47:46.994958 kernel: raid6: using avx2x2 recovery algorithm
Sep  4 18:47:47.040185 kernel: xor: automatically using best checksumming function   avx       
Sep  4 18:47:47.168213 kernel: Btrfs loaded, zoned=no, fsverity=no
Sep  4 18:47:47.174309 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook.
Sep  4 18:47:47.201497 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
Sep  4 18:47:47.207998 systemd-udevd[487]: Using default interface naming scheme 'v255'.
Sep  4 18:47:47.210397 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
Sep  4 18:47:47.241345 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook...
Sep  4 18:47:47.311239 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation
Sep  4 18:47:47.331874 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook.
Sep  4 18:47:47.358431 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
Sep  4 18:47:47.441837 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
Sep  4 18:47:47.501265 kernel: pps_core: LinuxPPS API ver. 1 registered
Sep  4 18:47:47.501287 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Sep  4 18:47:47.501305 kernel: cryptd: max_cpu_qlen set to 1000
Sep  4 18:47:47.468045 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Sep  4 18:47:47.583536 kernel: libata version 3.00 loaded.
Sep  4 18:47:47.583550 kernel: PTP clock support registered
Sep  4 18:47:47.583560 kernel: ACPI: bus type USB registered
Sep  4 18:47:47.583568 kernel: usbcore: registered new interface driver usbfs
Sep  4 18:47:47.583577 kernel: usbcore: registered new interface driver hub
Sep  4 18:47:47.583587 kernel: usbcore: registered new device driver usb
Sep  4 18:47:47.468108 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters.
Sep  4 18:47:47.622575 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Sep  4 18:47:47.622701 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1
Sep  4 18:47:47.622768 kernel: AVX2 version of gcm_enc/dec engaged.
Sep  4 18:47:47.583493 systemd[1]: Stopping dracut-cmdline-ask.service - dracut ask for additional cmdline parameters...
Sep  4 18:47:48.299278 kernel: ahci 0000:00:17.0: version 3.0
Sep  4 18:47:48.299377 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810
Sep  4 18:47:48.299445 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Sep  4 18:47:48.299507 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2
Sep  4 18:47:48.299569 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed
Sep  4 18:47:48.299629 kernel: hub 1-0:1.0: USB hub found
Sep  4 18:47:48.299702 kernel: hub 1-0:1.0: 16 ports detected
Sep  4 18:47:48.299768 kernel: hub 2-0:1.0: USB hub found
Sep  4 18:47:48.299840 kernel: hub 2-0:1.0: 10 ports detected
Sep  4 18:47:48.299904 kernel: AES CTR mode by8 optimization enabled
Sep  4 18:47:48.299914 kernel: igb: Intel(R) Gigabit Ethernet Network Driver
Sep  4 18:47:48.299921 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode
Sep  4 18:47:48.299981 kernel: igb: Copyright (c) 2007-2014 Intel Corporation.
Sep  4 18:47:48.299990 kernel: pps pps0: new PPS source ptp0
Sep  4 18:47:48.300051 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst 
Sep  4 18:47:48.300114 kernel: igb 0000:03:00.0: added PHC on eth0
Sep  4 18:47:48.300185 kernel: scsi host0: ahci
Sep  4 18:47:48.300249 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection
Sep  4 18:47:48.300324 kernel: scsi host1: ahci
Sep  4 18:47:48.300384 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:b6
Sep  4 18:47:48.300445 kernel: scsi host2: ahci
Sep  4 18:47:48.300508 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000
Sep  4 18:47:48.300572 kernel: scsi host3: ahci
Sep  4 18:47:48.300633 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s)
Sep  4 18:47:48.300694 kernel: scsi host4: ahci
Sep  4 18:47:48.300752 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd
Sep  4 18:47:48.300845 kernel: scsi host5: ahci
Sep  4 18:47:48.300905 kernel: pps pps1: new PPS source ptp1
Sep  4 18:47:48.300963 kernel: scsi host6: ahci
Sep  4 18:47:48.301026 kernel: igb 0000:04:00.0: added PHC on eth1
Sep  4 18:47:48.301092 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 128
Sep  4 18:47:48.301100 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection
Sep  4 18:47:48.301167 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 128
Sep  4 18:47:48.301176 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:b7
Sep  4 18:47:48.301236 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 128
Sep  4 18:47:48.301244 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000
Sep  4 18:47:48.301306 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 128
Sep  4 18:47:48.301314 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s)
Sep  4 18:47:48.301374 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 128
Sep  4 18:47:48.301383 kernel: hub 1-14:1.0: USB hub found
Sep  4 18:47:48.301455 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 128
Sep  4 18:47:48.301464 kernel: hub 1-14:1.0: 4 ports detected
Sep  4 18:47:48.301529 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 128
Sep  4 18:47:48.301539 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014
Sep  4 18:47:48.301604 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link)
Sep  4 18:47:47.612830 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Sep  4 18:47:47.612947 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:48.280940 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup...
Sep  4 18:47:48.343247 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup...
Sep  4 18:47:48.379192 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd
Sep  4 18:47:48.391000 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:48.414329 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters...
Sep  4 18:47:48.423327 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters.
Sep  4 18:47:48.495222 kernel: hid: raw HID events driver (C) Jiri Kosina
Sep  4 18:47:48.592148 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048)
Sep  4 18:47:48.592262 kernel: ata4: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.597173 kernel: mlx5_core 0000:01:00.0: Port module event: module 0, Cable plugged
Sep  4 18:47:48.597277 kernel: ata3: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.644143 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
Sep  4 18:47:48.661142 kernel: ata5: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.678180 kernel: ata6: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.694176 kernel: ata7: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.710173 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN,  D1MU020, max UDMA/133
Sep  4 18:47:48.728148 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
Sep  4 18:47:48.753034 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN,  D1MU020, max UDMA/133
Sep  4 18:47:48.788608 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA
Sep  4 18:47:48.788626 kernel: ata2.00: Features: NCQ-prio
Sep  4 18:47:48.822482 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA
Sep  4 18:47:48.822538 kernel: ata1.00: Features: NCQ-prio
Sep  4 18:47:48.853180 kernel: ata2.00: configured for UDMA/133
Sep  4 18:47:48.853238 kernel: ata1.00: configured for UDMA/133
Sep  4 18:47:48.868144 kernel: scsi 0:0:0:0: Direct-Access     ATA      Micron_5200_MTFD U020 PQ: 0 ANSI: 5
Sep  4 18:47:48.887227 kernel: scsi 1:0:0:0: Direct-Access     ATA      Micron_5200_MTFD U020 PQ: 0 ANSI: 5
Sep  4 18:47:48.895145 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic)
Sep  4 18:47:48.930148 kernel: igb 0000:03:00.0 eno1: renamed from eth0
Sep  4 18:47:48.930268 kernel: usbcore: registered new interface driver usbhid
Sep  4 18:47:48.930277 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014
Sep  4 18:47:48.930345 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link)
Sep  4 18:47:48.998702 kernel: usbhid: USB HID core driver
Sep  4 18:47:49.023158 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0
Sep  4 18:47:49.023195 kernel: igb 0000:04:00.0 eno2: renamed from eth1
Sep  4 18:47:49.082877 kernel: ata1.00: Enabling discard_zeroes_data
Sep  4 18:47:49.082915 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0
Sep  4 18:47:49.083173 kernel: ata2.00: Enabling discard_zeroes_data
Sep  4 18:47:49.083190 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB)
Sep  4 18:47:49.083370 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB)
Sep  4 18:47:49.083542 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks
Sep  4 18:47:49.083701 kernel: sd 1:0:0:0: [sdb] Write Protect is off
Sep  4 18:47:49.083868 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00
Sep  4 18:47:49.084023 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Sep  4 18:47:49.084208 kernel: sd 1:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes
Sep  4 18:47:49.084371 kernel: ata2.00: Enabling discard_zeroes_data
Sep  4 18:47:49.084387 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk
Sep  4 18:47:49.095143 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1
Sep  4 18:47:49.106817 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks
Sep  4 18:47:49.106901 kernel: sd 0:0:0:0: [sda] Write Protect is off
Sep  4 18:47:49.106965 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1
Sep  4 18:47:49.114298 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
Sep  4 18:47:49.240259 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048)
Sep  4 18:47:49.240356 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Sep  4 18:47:49.250265 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged
Sep  4 18:47:49.250351 kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes
Sep  4 18:47:49.465275 kernel: ata1.00: Enabling discard_zeroes_data
Sep  4 18:47:49.492597 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Sep  4 18:47:49.492614 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic)
Sep  4 18:47:49.492696 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
Sep  4 18:47:49.541178 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0
Sep  4 18:47:49.561875 systemd[1]: Found device dev-disk-by\x2dpartlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT.
Sep  4 18:47:49.659393 kernel: BTRFS: device fsid d110be6f-93a3-451a-b365-11b5d04e0602 devid 1 transid 33 /dev/sda3 scanned by (udev-worker) (552)
Sep  4 18:47:49.659412 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2
Sep  4 18:47:49.659532 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (673)
Sep  4 18:47:49.638254 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT.
Sep  4 18:47:49.641563 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5200_MTFDDAK480TDN USR-A.
Sep  4 18:47:49.670375 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5200_MTFDDAK480TDN USR-A.
Sep  4 18:47:49.699204 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5200_MTFDDAK480TDN OEM.
Sep  4 18:47:49.723048 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device.
Sep  4 18:47:49.757483 systemd[1]: Starting decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition...
Sep  4 18:47:49.777747 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary...
Sep  4 18:47:49.802434 systemd[1]: Finished decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition.
Sep  4 18:47:49.826941 systemd[1]: disk-uuid.service: Deactivated successfully.
Sep  4 18:47:49.827117 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary.
Sep  4 18:47:49.852321 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems.
Sep  4 18:47:49.870415 systemd[1]: Reached target local-fs.target - Local File Systems.
Sep  4 18:47:49.893432 systemd[1]: Reached target sysinit.target - System Initialization.
Sep  4 18:47:49.914469 systemd[1]: Reached target basic.target - Basic System.
Sep  4 18:47:49.945553 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook...
Sep  4 18:47:49.952018 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr...
Sep  4 18:47:50.001469 sh[718]: Success
Sep  4 18:47:50.009086 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook.
Sep  4 18:47:50.034262 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2"
Sep  4 18:47:50.009732 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems.
Sep  4 18:47:50.045246 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep  4 18:47:50.076244 systemd[1]: Reached target remote-fs.target - Remote File Systems.
Sep  4 18:47:50.093400 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook...
Sep  4 18:47:50.108187 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr.
Sep  4 18:47:50.114046 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr...
Sep  4 18:47:50.145881 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr.
Sep  4 18:47:50.159642 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook.
Sep  4 18:47:50.297708 kernel: BTRFS info (device dm-0): first mount of filesystem d110be6f-93a3-451a-b365-11b5d04e0602
Sep  4 18:47:50.297721 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm
Sep  4 18:47:50.297729 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead
Sep  4 18:47:50.297736 kernel: BTRFS info (device dm-0): disabling log replay at mount time
Sep  4 18:47:50.297744 kernel: BTRFS info (device dm-0): using free space tree
Sep  4 18:47:50.297750 kernel: BTRFS info (device dm-0): enabling ssd optimizations
Sep  4 18:47:50.300507 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT...
Sep  4 18:47:50.311681 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr.
Sep  4 18:47:50.337832 systemd-fsck[768]: ROOT: clean, 81/553520 files, 52718/553472 blocks
Sep  4 18:47:50.349902 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT.
Sep  4 18:47:50.369344 systemd[1]: Mounting sysroot.mount - /sysroot...
Sep  4 18:47:50.492145 kernel: EXT4-fs (sda9): mounted filesystem 84a5cefa-c3c7-47d7-9305-7e6877f73628 r/w with ordered data mode. Quota mode: none.
Sep  4 18:47:50.492210 systemd[1]: Mounted sysroot.mount - /sysroot.
Sep  4 18:47:50.492507 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System.
Sep  4 18:47:50.527329 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem...
Sep  4 18:47:50.529810 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr...
Sep  4 18:47:50.587198 kernel: BTRFS info (device sda6): first mount of filesystem 50e7422b-f0c7-4536-902a-3ab4c864240b
Sep  4 18:47:50.587216 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Sep  4 18:47:50.606385 kernel: BTRFS info (device sda6): using free space tree
Sep  4 18:47:50.648693 kernel: BTRFS info (device sda6): enabling ssd optimizations
Sep  4 18:47:50.648711 kernel: BTRFS info (device sda6): auto enabling async discard
Sep  4 18:47:50.663994 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem.
Sep  4 18:47:50.672972 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr.
Sep  4 18:47:50.694271 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup...
Sep  4 18:47:50.767633 initrd-setup-root[800]: cut: /sysroot/etc/passwd: No such file or directory
Sep  4 18:47:50.777258 initrd-setup-root[807]: cut: /sysroot/etc/group: No such file or directory
Sep  4 18:47:50.787257 initrd-setup-root[814]: cut: /sysroot/etc/shadow: No such file or directory
Sep  4 18:47:50.797262 initrd-setup-root[821]: cut: /sysroot/etc/gshadow: No such file or directory
Sep  4 18:47:50.870877 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup.
Sep  4 18:47:50.901616 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion...
Sep  4 18:47:50.922804 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion.
Sep  4 18:47:50.945427 initrd-setup-root-after-ignition[965]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Sep  4 18:47:50.945427 initrd-setup-root-after-ignition[965]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory
Sep  4 18:47:50.935320 systemd[1]: Reached target ignition-subsequent.target - Subsequent (Not Ignition) boot complete.
Sep  4 18:47:51.007470 initrd-setup-root-after-ignition[969]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Sep  4 18:47:50.970359 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root...
Sep  4 18:47:51.035926 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Sep  4 18:47:51.035999 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root.
Sep  4 18:47:51.055977 systemd[1]: Reached target initrd-fs.target - Initrd File Systems.
Sep  4 18:47:51.077448 systemd[1]: Reached target initrd.target - Initrd Default Target.
Sep  4 18:47:51.097546 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met.
Sep  4 18:47:51.115339 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook...
Sep  4 18:47:51.163041 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
Sep  4 18:47:51.191530 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons...
Sep  4 18:47:51.219691 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep  4 18:47:51.231671 systemd[1]: Stopped target timers.target - Timer Units.
Sep  4 18:47:51.250694 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Sep  4 18:47:51.251060 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
Sep  4 18:47:51.288530 systemd[1]: Stopped target initrd.target - Initrd Default Target.
Sep  4 18:47:51.298716 systemd[1]: Stopped target basic.target - Basic System.
Sep  4 18:47:51.317743 systemd[1]: Stopped target ignition-subsequent.target - Subsequent (Not Ignition) boot complete.
Sep  4 18:47:51.338718 systemd[1]: Stopped target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup.
Sep  4 18:47:51.363703 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device.
Sep  4 18:47:51.387694 systemd[1]: Stopped target paths.target - Path Units.
Sep  4 18:47:51.407824 systemd[1]: Stopped target remote-fs.target - Remote File Systems.
Sep  4 18:47:51.426709 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems.
Sep  4 18:47:51.447710 systemd[1]: Stopped target slices.target - Slice Units.
Sep  4 18:47:51.467697 systemd[1]: Stopped target sockets.target - Socket Units.
Sep  4 18:47:51.486720 systemd[1]: Stopped target sysinit.target - System Initialization.
Sep  4 18:47:51.505834 systemd[1]: Stopped target local-fs.target - Local File Systems.
Sep  4 18:47:51.525693 systemd[1]: Stopped target swap.target - Swaps.
Sep  4 18:47:51.543671 systemd[1]: iscsid.socket: Deactivated successfully.
Sep  4 18:47:51.543941 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket.
Sep  4 18:47:51.560758 systemd[1]: iscsiuio.socket: Deactivated successfully.
Sep  4 18:47:51.561027 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket.
Sep  4 18:47:51.578821 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Sep  4 18:47:51.579188 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook.
Sep  4 18:47:51.606911 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes.
Sep  4 18:47:51.626592 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Sep  4 18:47:51.627017 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch.
Sep  4 18:47:51.647725 systemd[1]: Stopped target cryptsetup-pre.target - Local Encrypted Volumes (Pre).
Sep  4 18:47:51.669593 systemd[1]: clevis-luks-askpass.path: Deactivated successfully.
Sep  4 18:47:51.670003 systemd[1]: Stopped clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch.
Sep  4 18:47:51.691582 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Sep  4 18:47:51.691943 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook.
Sep  4 18:47:51.724637 systemd[1]: decrypt-root.service: Deactivated successfully.
Sep  4 18:47:51.725040 systemd[1]: Stopped decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition.
Sep  4 18:47:51.747763 systemd[1]: ignition-setup-pre.service: Deactivated successfully.
Sep  4 18:47:51.748105 systemd[1]: Stopped ignition-setup-pre.service - Ignition env setup.
Sep  4 18:47:51.766881 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Sep  4 18:47:51.767273 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion.
Sep  4 18:47:51.790782 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Sep  4 18:47:51.791123 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup.
Sep  4 18:47:51.809783 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Sep  4 18:47:51.810127 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes.
Sep  4 18:47:51.830774 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Sep  4 18:47:51.831114 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables.
Sep  4 18:47:51.849761 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Sep  4 18:47:51.850101 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules.
Sep  4 18:47:51.873773 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully.
Sep  4 18:47:51.874115 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Sep  4 18:47:51.894778 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Sep  4 18:47:51.895118 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices.
Sep  4 18:47:51.915775 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Sep  4 18:47:51.916114 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook.
Sep  4 18:47:51.949222 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files...
Sep  4 18:47:51.979818 systemd[1]: systemd-udevd.service: Deactivated successfully.
Sep  4 18:47:51.979908 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files.
Sep  4 18:47:51.989791 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Sep  4 18:47:51.989861 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons.
Sep  4 18:47:52.020471 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Sep  4 18:47:52.020624 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket.
Sep  4 18:47:52.039489 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Sep  4 18:47:52.039595 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket.
Sep  4 18:47:52.060592 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Sep  4 18:47:52.060754 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook.
Sep  4 18:47:52.101403 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Sep  4 18:47:52.101576 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook.
Sep  4 18:47:52.142388 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Sep  4 18:47:52.142560 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters.
Sep  4 18:47:52.198434 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database...
Sep  4 18:47:52.224334 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Sep  4 18:47:52.429214 systemd-journald[260]: Received SIGTERM from PID 1 (systemd).
Sep  4 18:47:52.224410 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Sep  4 18:47:52.247427 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Sep  4 18:47:52.247525 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:52.269380 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Sep  4 18:47:52.269605 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database.
Sep  4 18:47:52.290401 systemd[1]: Reached target initrd-switch-root.target - Switch Root.
Sep  4 18:47:52.320507 systemd[1]: Starting initrd-switch-root.service - Switch Root...
Sep  4 18:47:52.372582 systemd[1]: Switching root.
Sep  4 18:47:52.429431 systemd-journald[260]: Journal stopped
Sep  4 18:47:45.977559 kernel: microcode: updated early: 0xf4 -> 0xfc, date = 2023-07-27
Sep  4 18:47:45.977573 kernel: Linux version 6.6.48-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.2.1_p20240210 p14) 13.2.1 20240210, GNU ld (Gentoo 2.41 p5) 2.41.0) #1 SMP PREEMPT_DYNAMIC Wed Sep  4 15:49:08 -00 2024
Sep  4 18:47:45.977579 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf
Sep  4 18:47:45.977585 kernel: BIOS-provided physical RAM map:
Sep  4 18:47:45.977589 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable
Sep  4 18:47:45.977592 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved
Sep  4 18:47:45.977597 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
Sep  4 18:47:45.977601 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable
Sep  4 18:47:45.977605 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved
Sep  4 18:47:45.977609 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819cefff] usable
Sep  4 18:47:45.977613 kernel: BIOS-e820: [mem 0x00000000819cf000-0x00000000819cffff] ACPI NVS
Sep  4 18:47:45.977618 kernel: BIOS-e820: [mem 0x00000000819d0000-0x00000000819d0fff] reserved
Sep  4 18:47:45.977622 kernel: BIOS-e820: [mem 0x00000000819d1000-0x000000008afccfff] usable
Sep  4 18:47:45.977626 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved
Sep  4 18:47:45.977631 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable
Sep  4 18:47:45.977636 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS
Sep  4 18:47:45.977641 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved
Sep  4 18:47:45.977646 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable
Sep  4 18:47:45.977650 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved
Sep  4 18:47:45.977655 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved
Sep  4 18:47:45.977659 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
Sep  4 18:47:45.977664 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
Sep  4 18:47:45.977668 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved
Sep  4 18:47:45.977673 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
Sep  4 18:47:45.977677 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable
Sep  4 18:47:45.977682 kernel: NX (Execute Disable) protection: active
Sep  4 18:47:45.977686 kernel: APIC: Static calls initialized
Sep  4 18:47:45.977691 kernel: SMBIOS 3.2.1 present.
Sep  4 18:47:45.977696 kernel: DMI: Supermicro SYS-5019C-MR/X11SCM-F, BIOS 1.9 09/16/2022
Sep  4 18:47:45.977701 kernel: tsc: Detected 3400.000 MHz processor
Sep  4 18:47:45.977706 kernel: tsc: Detected 3399.906 MHz TSC
Sep  4 18:47:45.977710 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Sep  4 18:47:45.977715 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Sep  4 18:47:45.977720 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000
Sep  4 18:47:45.977725 kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 23), built from 10 variable MTRRs
Sep  4 18:47:45.977730 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Sep  4 18:47:45.977734 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000
Sep  4 18:47:45.977739 kernel: Using GB pages for direct mapping
Sep  4 18:47:45.977745 kernel: ACPI: Early table checksum verification disabled
Sep  4 18:47:45.977750 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM)
Sep  4 18:47:45.977756 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM   01072009 AMI  00010013)
Sep  4 18:47:45.977761 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06                 01072009 AMI  00010013)
Sep  4 18:47:45.977766 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527)
Sep  4 18:47:45.977771 kernel: ACPI: FACS 0x000000008C66CF80 000040
Sep  4 18:47:45.977777 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04                 01072009 AMI  00010013)
Sep  4 18:47:45.977782 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01                 01072009 AMI  00010013)
Sep  4 18:47:45.977787 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI  00010013)
Sep  4 18:47:45.977792 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097)
Sep  4 18:47:45.977797 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000)
Sep  4 18:47:45.977801 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt  00003000 INTL 20160527)
Sep  4 18:47:45.977806 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt   00003000 INTL 20160527)
Sep  4 18:47:45.977812 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt  00001000 INTL 20160527)
Sep  4 18:47:45.977817 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977822 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527)
Sep  4 18:47:45.977827 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL  xh_mossb 00000000 INTL 20160527)
Sep  4 18:47:45.977832 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977837 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977842 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527)
Sep  4 18:47:45.977846 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527)
Sep  4 18:47:45.977851 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977857 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002      01000013)
Sep  4 18:47:45.977862 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527)
Sep  4 18:47:45.977867 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL  EDK2     00000002      01000013)
Sep  4 18:47:45.977872 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel  ADebTabl 00001000 INTL 20160527)
Sep  4 18:47:45.977877 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI  00000000)
Sep  4 18:47:45.977882 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL  SpsNm    00000002 INTL 20160527)
Sep  4 18:47:45.977887 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM          01072009 AMI  00010013)
Sep  4 18:47:45.977892 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI    AMI.EINJ 00000000 AMI. 00000000)
Sep  4 18:47:45.977898 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER  AMI.ERST 00000000 AMI. 00000000)
Sep  4 18:47:45.977903 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI    AMI.BERT 00000000 AMI. 00000000)
Sep  4 18:47:45.977908 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI    AMI.HEST 00000000 AMI. 00000000)
Sep  4 18:47:45.977912 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN   00000000 INTL 20181221)
Sep  4 18:47:45.977917 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783]
Sep  4 18:47:45.977922 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b]
Sep  4 18:47:45.977927 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf]
Sep  4 18:47:45.977932 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3]
Sep  4 18:47:45.977937 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb]
Sep  4 18:47:45.977943 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b]
Sep  4 18:47:45.977948 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db]
Sep  4 18:47:45.977952 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20]
Sep  4 18:47:45.977957 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543]
Sep  4 18:47:45.977962 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d]
Sep  4 18:47:45.977967 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a]
Sep  4 18:47:45.977972 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77]
Sep  4 18:47:45.977977 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25]
Sep  4 18:47:45.977982 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b]
Sep  4 18:47:45.977987 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361]
Sep  4 18:47:45.977992 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb]
Sep  4 18:47:45.977997 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd]
Sep  4 18:47:45.978002 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1]
Sep  4 18:47:45.978007 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb]
Sep  4 18:47:45.978012 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153]
Sep  4 18:47:45.978016 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe]
Sep  4 18:47:45.978021 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f]
Sep  4 18:47:45.978026 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73]
Sep  4 18:47:45.978031 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab]
Sep  4 18:47:45.978037 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e]
Sep  4 18:47:45.978042 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67]
Sep  4 18:47:45.978046 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97]
Sep  4 18:47:45.978051 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7]
Sep  4 18:47:45.978056 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7]
Sep  4 18:47:45.978061 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273]
Sep  4 18:47:45.978066 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9]
Sep  4 18:47:45.978071 kernel: No NUMA configuration found
Sep  4 18:47:45.978076 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff]
Sep  4 18:47:45.978082 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff]
Sep  4 18:47:45.978087 kernel: Zone ranges:
Sep  4 18:47:45.978092 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Sep  4 18:47:45.978097 kernel:   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Sep  4 18:47:45.978101 kernel:   Normal   [mem 0x0000000100000000-0x000000086effffff]
Sep  4 18:47:45.978106 kernel: Movable zone start for each node
Sep  4 18:47:45.978111 kernel: Early memory node ranges
Sep  4 18:47:45.978116 kernel:   node   0: [mem 0x0000000000001000-0x0000000000098fff]
Sep  4 18:47:45.978121 kernel:   node   0: [mem 0x0000000000100000-0x000000003fffffff]
Sep  4 18:47:45.978127 kernel:   node   0: [mem 0x0000000040400000-0x00000000819cefff]
Sep  4 18:47:45.978132 kernel:   node   0: [mem 0x00000000819d1000-0x000000008afccfff]
Sep  4 18:47:45.978136 kernel:   node   0: [mem 0x000000008c0b2000-0x000000008c23afff]
Sep  4 18:47:45.978145 kernel:   node   0: [mem 0x000000008eeff000-0x000000008eefffff]
Sep  4 18:47:45.978153 kernel:   node   0: [mem 0x0000000100000000-0x000000086effffff]
Sep  4 18:47:45.978159 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff]
Sep  4 18:47:45.978165 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Sep  4 18:47:45.978170 kernel: On node 0, zone DMA: 103 pages in unavailable ranges
Sep  4 18:47:45.978176 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges
Sep  4 18:47:45.978181 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges
Sep  4 18:47:45.978187 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges
Sep  4 18:47:45.978192 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges
Sep  4 18:47:45.978197 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges
Sep  4 18:47:45.978202 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges
Sep  4 18:47:45.978208 kernel: ACPI: PM-Timer IO Port: 0x1808
Sep  4 18:47:45.978213 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
Sep  4 18:47:45.978218 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
Sep  4 18:47:45.978225 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
Sep  4 18:47:45.978230 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
Sep  4 18:47:45.978235 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1])
Sep  4 18:47:45.978240 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1])
Sep  4 18:47:45.978246 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1])
Sep  4 18:47:45.978251 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1])
Sep  4 18:47:45.978256 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1])
Sep  4 18:47:45.978261 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1])
Sep  4 18:47:45.978266 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1])
Sep  4 18:47:45.978272 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1])
Sep  4 18:47:45.978278 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1])
Sep  4 18:47:45.978283 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1])
Sep  4 18:47:45.978288 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1])
Sep  4 18:47:45.978293 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1])
Sep  4 18:47:45.978298 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
Sep  4 18:47:45.978304 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Sep  4 18:47:45.978309 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Sep  4 18:47:45.978314 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Sep  4 18:47:45.978319 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Sep  4 18:47:45.978326 kernel: TSC deadline timer available
Sep  4 18:47:45.978331 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs
Sep  4 18:47:45.978336 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices
Sep  4 18:47:45.978342 kernel: Booting paravirtualized kernel on bare hardware
Sep  4 18:47:45.978347 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Sep  4 18:47:45.978352 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1
Sep  4 18:47:45.978357 kernel: percpu: Embedded 58 pages/cpu s196904 r8192 d32472 u262144
Sep  4 18:47:45.978363 kernel: pcpu-alloc: s196904 r8192 d32472 u262144 alloc=1*2097152
Sep  4 18:47:45.978368 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 
Sep  4 18:47:45.978375 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf
Sep  4 18:47:45.978380 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Sep  4 18:47:45.978385 kernel: random: crng init done
Sep  4 18:47:45.978390 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear)
Sep  4 18:47:45.978396 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear)
Sep  4 18:47:45.978401 kernel: Fallback order for Node 0: 0 
Sep  4 18:47:45.978406 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 8232415
Sep  4 18:47:45.978411 kernel: Policy zone: Normal
Sep  4 18:47:45.978418 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Sep  4 18:47:45.978423 kernel: software IO TLB: area num 16.
Sep  4 18:47:45.978429 kernel: Memory: 32714168K/33452980K available (12288K kernel code, 2303K rwdata, 22640K rodata, 49336K init, 2008K bss, 738552K reserved, 0K cma-reserved)
Sep  4 18:47:45.978434 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1
Sep  4 18:47:45.978439 kernel: ftrace: allocating 37670 entries in 148 pages
Sep  4 18:47:45.978445 kernel: ftrace: allocated 148 pages with 3 groups
Sep  4 18:47:45.978450 kernel: Dynamic Preempt: voluntary
Sep  4 18:47:45.978455 kernel: rcu: Preemptible hierarchical RCU implementation.
Sep  4 18:47:45.978461 kernel: rcu:         RCU event tracing is enabled.
Sep  4 18:47:45.978467 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16.
Sep  4 18:47:45.978472 kernel:         Trampoline variant of Tasks RCU enabled.
Sep  4 18:47:45.978478 kernel:         Rude variant of Tasks RCU enabled.
Sep  4 18:47:45.978483 kernel:         Tracing variant of Tasks RCU enabled.
Sep  4 18:47:45.978488 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Sep  4 18:47:45.978493 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16
Sep  4 18:47:45.978499 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16
Sep  4 18:47:45.978504 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention.
Sep  4 18:47:45.978509 kernel: Console: colour dummy device 80x25
Sep  4 18:47:45.978515 kernel: printk: console [tty0] enabled
Sep  4 18:47:45.978521 kernel: printk: console [ttyS1] enabled
Sep  4 18:47:45.978526 kernel: ACPI: Core revision 20230628
Sep  4 18:47:45.978531 kernel: hpet: HPET dysfunctional in PC10. Force disabled.
Sep  4 18:47:45.978537 kernel: APIC: Switch to symmetric I/O mode setup
Sep  4 18:47:45.978542 kernel: DMAR: Host address width 39
Sep  4 18:47:45.978547 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1
Sep  4 18:47:45.978552 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da
Sep  4 18:47:45.978558 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff
Sep  4 18:47:45.978564 kernel: DMAR-IR: IOAPIC id 2 under DRHD base  0xfed91000 IOMMU 0
Sep  4 18:47:45.978569 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000
Sep  4 18:47:45.978574 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping.
Sep  4 18:47:45.978580 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode
Sep  4 18:47:45.978585 kernel: x2apic enabled
Sep  4 18:47:45.978590 kernel: APIC: Switched APIC routing to: cluster x2apic
Sep  4 18:47:45.978596 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns
Sep  4 18:47:45.978601 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906)
Sep  4 18:47:45.978606 kernel: CPU0: Thermal monitoring enabled (TM1)
Sep  4 18:47:45.978612 kernel: process: using mwait in idle threads
Sep  4 18:47:45.978618 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Sep  4 18:47:45.978623 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Sep  4 18:47:45.978628 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Sep  4 18:47:45.978633 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit
Sep  4 18:47:45.978639 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall
Sep  4 18:47:45.978644 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS
Sep  4 18:47:45.978649 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Sep  4 18:47:45.978654 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT
Sep  4 18:47:45.978659 kernel: RETBleed: Mitigation: Enhanced IBRS
Sep  4 18:47:45.978664 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Sep  4 18:47:45.978670 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl
Sep  4 18:47:45.978676 kernel: TAA: Mitigation: TSX disabled
Sep  4 18:47:45.978681 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers
Sep  4 18:47:45.978686 kernel: SRBDS: Mitigation: Microcode
Sep  4 18:47:45.978691 kernel: GDS: Mitigation: Microcode
Sep  4 18:47:45.978696 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Sep  4 18:47:45.978702 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Sep  4 18:47:45.978707 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Sep  4 18:47:45.978712 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Sep  4 18:47:45.978717 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Sep  4 18:47:45.978722 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Sep  4 18:47:45.978728 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Sep  4 18:47:45.978733 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Sep  4 18:47:45.978739 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format.
Sep  4 18:47:45.978744 kernel: Freeing SMP alternatives memory: 32K
Sep  4 18:47:45.978749 kernel: pid_max: default: 32768 minimum: 301
Sep  4 18:47:45.978754 kernel: LSM: initializing lsm=lockdown,capability,selinux,integrity
Sep  4 18:47:45.978759 kernel: SELinux:  Initializing.
Sep  4 18:47:45.978765 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Sep  4 18:47:45.978770 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Sep  4 18:47:45.978775 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd)
Sep  4 18:47:45.978780 kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
Sep  4 18:47:45.978787 kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
Sep  4 18:47:45.978792 kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1.
Sep  4 18:47:45.978797 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver.
Sep  4 18:47:45.978802 kernel: ... version:                4
Sep  4 18:47:45.978808 kernel: ... bit width:              48
Sep  4 18:47:45.978813 kernel: ... generic registers:      4
Sep  4 18:47:45.978818 kernel: ... value mask:             0000ffffffffffff
Sep  4 18:47:45.978823 kernel: ... max period:             00007fffffffffff
Sep  4 18:47:45.978829 kernel: ... fixed-purpose events:   3
Sep  4 18:47:45.978835 kernel: ... event mask:             000000070000000f
Sep  4 18:47:45.978840 kernel: signal: max sigframe size: 2032
Sep  4 18:47:45.978845 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445
Sep  4 18:47:45.978851 kernel: rcu: Hierarchical SRCU implementation.
Sep  4 18:47:45.978856 kernel: rcu:         Max phase no-delay instances is 400.
Sep  4 18:47:45.978861 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter.
Sep  4 18:47:45.978866 kernel: smp: Bringing up secondary CPUs ...
Sep  4 18:47:45.978871 kernel: smpboot: x86: Booting SMP configuration:
Sep  4 18:47:45.978877 kernel: .... node  #0, CPUs:        #1  #2  #3  #4  #5  #6  #7  #8  #9 #10 #11 #12 #13 #14 #15
Sep  4 18:47:45.978883 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Sep  4 18:47:45.978889 kernel: smp: Brought up 1 node, 16 CPUs
Sep  4 18:47:45.978894 kernel: smpboot: Max logical packages: 1
Sep  4 18:47:45.978899 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS)
Sep  4 18:47:45.978904 kernel: devtmpfs: initialized
Sep  4 18:47:45.978910 kernel: x86/mm: Memory block size: 128MB
Sep  4 18:47:45.978915 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819cf000-0x819cffff] (4096 bytes)
Sep  4 18:47:45.978920 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes)
Sep  4 18:47:45.978926 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Sep  4 18:47:45.978932 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear)
Sep  4 18:47:45.978937 kernel: pinctrl core: initialized pinctrl subsystem
Sep  4 18:47:45.978943 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Sep  4 18:47:45.978948 kernel: audit: initializing netlink subsys (disabled)
Sep  4 18:47:45.978953 kernel: audit: type=2000 audit(1725475660.040:1): state=initialized audit_enabled=0 res=1
Sep  4 18:47:45.978958 kernel: thermal_sys: Registered thermal governor 'step_wise'
Sep  4 18:47:45.978963 kernel: thermal_sys: Registered thermal governor 'user_space'
Sep  4 18:47:45.978969 kernel: cpuidle: using governor menu
Sep  4 18:47:45.978974 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Sep  4 18:47:45.978980 kernel: dca service started, version 1.12.1
Sep  4 18:47:45.978985 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000)
Sep  4 18:47:45.978991 kernel: PCI: Using configuration type 1 for base access
Sep  4 18:47:45.978996 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance'
Sep  4 18:47:45.979001 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Sep  4 18:47:45.979006 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages
Sep  4 18:47:45.979012 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page
Sep  4 18:47:45.979017 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages
Sep  4 18:47:45.979023 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page
Sep  4 18:47:45.979028 kernel: ACPI: Added _OSI(Module Device)
Sep  4 18:47:45.979033 kernel: ACPI: Added _OSI(Processor Device)
Sep  4 18:47:45.979039 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Sep  4 18:47:45.979044 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Sep  4 18:47:45.979049 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded
Sep  4 18:47:45.979054 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979060 kernel: ACPI: SSDT 0xFFFFA0F880E46C00 000400 (v02 PmRef  Cpu0Cst  00003001 INTL 20160527)
Sep  4 18:47:45.979065 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979070 kernel: ACPI: SSDT 0xFFFFA0F881E11800 000683 (v02 PmRef  Cpu0Ist  00003000 INTL 20160527)
Sep  4 18:47:45.979076 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979082 kernel: ACPI: SSDT 0xFFFFA0F880DEAE00 0000F4 (v02 PmRef  Cpu0Psd  00003000 INTL 20160527)
Sep  4 18:47:45.979087 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979092 kernel: ACPI: SSDT 0xFFFFA0F881EC2000 0005FC (v02 PmRef  ApIst    00003000 INTL 20160527)
Sep  4 18:47:45.979097 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979102 kernel: ACPI: SSDT 0xFFFFA0F881ECA000 000AB0 (v02 PmRef  ApPsd    00003000 INTL 20160527)
Sep  4 18:47:45.979107 kernel: ACPI: Dynamic OEM Table Load:
Sep  4 18:47:45.979113 kernel: ACPI: SSDT 0xFFFFA0F881ED4800 00030A (v02 PmRef  ApCst    00003000 INTL 20160527)
Sep  4 18:47:45.979118 kernel: ACPI: _OSC evaluated successfully for all CPUs
Sep  4 18:47:45.979124 kernel: ACPI: Interpreter enabled
Sep  4 18:47:45.979130 kernel: ACPI: PM: (supports S0 S5)
Sep  4 18:47:45.979135 kernel: ACPI: Using IOAPIC for interrupt routing
Sep  4 18:47:45.979147 kernel: HEST: Enabling Firmware First mode for corrected errors.
Sep  4 18:47:45.979153 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14.
Sep  4 18:47:45.979158 kernel: HEST: Table parsing has been initialized.
Sep  4 18:47:45.979163 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC.
Sep  4 18:47:45.979169 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Sep  4 18:47:45.979174 kernel: PCI: Using E820 reservations for host bridge windows
Sep  4 18:47:45.979180 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F
Sep  4 18:47:45.979186 kernel: ACPI: \_SB_.PCI0.XDCI.USBC: New power resource
Sep  4 18:47:45.979191 kernel: ACPI: \_SB_.PCI0.SAT0.VOL0.V0PR: New power resource
Sep  4 18:47:45.979197 kernel: ACPI: \_SB_.PCI0.SAT0.VOL1.V1PR: New power resource
Sep  4 18:47:45.979202 kernel: ACPI: \_SB_.PCI0.SAT0.VOL2.V2PR: New power resource
Sep  4 18:47:45.979207 kernel: ACPI: \_SB_.PCI0.CNVW.WRST: New power resource
Sep  4 18:47:45.979212 kernel: ACPI: \_TZ_.FN00: New power resource
Sep  4 18:47:45.979218 kernel: ACPI: \_TZ_.FN01: New power resource
Sep  4 18:47:45.979223 kernel: ACPI: \_TZ_.FN02: New power resource
Sep  4 18:47:45.979229 kernel: ACPI: \_TZ_.FN03: New power resource
Sep  4 18:47:45.979234 kernel: ACPI: \_TZ_.FN04: New power resource
Sep  4 18:47:45.979240 kernel: ACPI: \PIN_: New power resource
Sep  4 18:47:45.979245 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
Sep  4 18:47:45.979316 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
Sep  4 18:47:45.979368 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER]
Sep  4 18:47:45.979414 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR]
Sep  4 18:47:45.979422 kernel: PCI host bridge to bus 0000:00
Sep  4 18:47:45.979474 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Sep  4 18:47:45.979516 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Sep  4 18:47:45.979557 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Sep  4 18:47:45.979598 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window]
Sep  4 18:47:45.979638 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window]
Sep  4 18:47:45.979679 kernel: pci_bus 0000:00: root bus resource [bus 00-fe]
Sep  4 18:47:45.979737 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000
Sep  4 18:47:45.979795 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400
Sep  4 18:47:45.979845 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.979897 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000
Sep  4 18:47:45.979945 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit]
Sep  4 18:47:45.979997 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000
Sep  4 18:47:45.980046 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit]
Sep  4 18:47:45.980098 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330
Sep  4 18:47:45.980153 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit]
Sep  4 18:47:45.980203 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold
Sep  4 18:47:45.980254 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000
Sep  4 18:47:45.980301 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit]
Sep  4 18:47:45.980347 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit]
Sep  4 18:47:45.980400 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000
Sep  4 18:47:45.980447 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Sep  4 18:47:45.980500 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000
Sep  4 18:47:45.980547 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Sep  4 18:47:45.980599 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000
Sep  4 18:47:45.980645 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit]
Sep  4 18:47:45.980694 kernel: pci 0000:00:16.0: PME# supported from D3hot
Sep  4 18:47:45.980744 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000
Sep  4 18:47:45.980798 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit]
Sep  4 18:47:45.980848 kernel: pci 0000:00:16.1: PME# supported from D3hot
Sep  4 18:47:45.980897 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000
Sep  4 18:47:45.980945 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit]
Sep  4 18:47:45.980993 kernel: pci 0000:00:16.4: PME# supported from D3hot
Sep  4 18:47:45.981045 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601
Sep  4 18:47:45.981091 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff]
Sep  4 18:47:45.981138 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff]
Sep  4 18:47:45.981187 kernel: pci 0000:00:17.0: reg 0x18: [io  0x6050-0x6057]
Sep  4 18:47:45.981236 kernel: pci 0000:00:17.0: reg 0x1c: [io  0x6040-0x6043]
Sep  4 18:47:45.981281 kernel: pci 0000:00:17.0: reg 0x20: [io  0x6020-0x603f]
Sep  4 18:47:45.981328 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff]
Sep  4 18:47:45.981377 kernel: pci 0000:00:17.0: PME# supported from D3hot
Sep  4 18:47:45.981431 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400
Sep  4 18:47:45.981478 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981534 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400
Sep  4 18:47:45.981584 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981636 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400
Sep  4 18:47:45.981686 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981737 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400
Sep  4 18:47:45.981786 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981839 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400
Sep  4 18:47:45.981888 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.981940 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000
Sep  4 18:47:45.981988 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Sep  4 18:47:45.982039 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100
Sep  4 18:47:45.982090 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500
Sep  4 18:47:45.982142 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit]
Sep  4 18:47:45.982192 kernel: pci 0000:00:1f.4: reg 0x20: [io  0xefa0-0xefbf]
Sep  4 18:47:45.982245 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000
Sep  4 18:47:45.982293 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff]
Sep  4 18:47:45.982348 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000
Sep  4 18:47:45.982397 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref]
Sep  4 18:47:45.982446 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref]
Sep  4 18:47:45.982497 kernel: pci 0000:01:00.0: PME# supported from D3cold
Sep  4 18:47:45.982547 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref]
Sep  4 18:47:45.982595 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs)
Sep  4 18:47:45.982648 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000
Sep  4 18:47:45.982697 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref]
Sep  4 18:47:45.982745 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref]
Sep  4 18:47:45.982794 kernel: pci 0000:01:00.1: PME# supported from D3cold
Sep  4 18:47:45.982844 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref]
Sep  4 18:47:45.982896 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs)
Sep  4 18:47:45.982944 kernel: pci 0000:00:01.0: PCI bridge to [bus 01]
Sep  4 18:47:45.982992 kernel: pci 0000:00:01.0:   bridge window [mem 0x95100000-0x952fffff]
Sep  4 18:47:45.983040 kernel: pci 0000:00:01.0:   bridge window [mem 0x90000000-0x93ffffff 64bit pref]
Sep  4 18:47:45.983088 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02]
Sep  4 18:47:45.983143 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect
Sep  4 18:47:45.983197 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000
Sep  4 18:47:45.983247 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff]
Sep  4 18:47:45.983295 kernel: pci 0000:03:00.0: reg 0x18: [io  0x5000-0x501f]
Sep  4 18:47:45.983344 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff]
Sep  4 18:47:45.983391 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.983440 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03]
Sep  4 18:47:45.983486 kernel: pci 0000:00:1b.4:   bridge window [io  0x5000-0x5fff]
Sep  4 18:47:45.983533 kernel: pci 0000:00:1b.4:   bridge window [mem 0x95400000-0x954fffff]
Sep  4 18:47:45.983588 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect
Sep  4 18:47:45.983639 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000
Sep  4 18:47:45.983687 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff]
Sep  4 18:47:45.983736 kernel: pci 0000:04:00.0: reg 0x18: [io  0x4000-0x401f]
Sep  4 18:47:45.983785 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff]
Sep  4 18:47:45.983832 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold
Sep  4 18:47:45.983881 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04]
Sep  4 18:47:45.983931 kernel: pci 0000:00:1b.5:   bridge window [io  0x4000-0x4fff]
Sep  4 18:47:45.983979 kernel: pci 0000:00:1b.5:   bridge window [mem 0x95300000-0x953fffff]
Sep  4 18:47:45.984027 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05]
Sep  4 18:47:45.984081 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400
Sep  4 18:47:45.984130 kernel: pci 0000:06:00.0: enabling Extended Tags
Sep  4 18:47:45.984183 kernel: pci 0000:06:00.0: supports D1 D2
Sep  4 18:47:45.984232 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Sep  4 18:47:45.984280 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07]
Sep  4 18:47:45.984330 kernel: pci 0000:00:1c.3:   bridge window [io  0x3000-0x3fff]
Sep  4 18:47:45.984378 kernel: pci 0000:00:1c.3:   bridge window [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.984433 kernel: pci_bus 0000:07: extended config space not accessible
Sep  4 18:47:45.984488 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000
Sep  4 18:47:45.984541 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff]
Sep  4 18:47:45.984591 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff]
Sep  4 18:47:45.984642 kernel: pci 0000:07:00.0: reg 0x18: [io  0x3000-0x307f]
Sep  4 18:47:45.984695 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Sep  4 18:47:45.984745 kernel: pci 0000:07:00.0: supports D1 D2
Sep  4 18:47:45.984796 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Sep  4 18:47:45.984844 kernel: pci 0000:06:00.0: PCI bridge to [bus 07]
Sep  4 18:47:45.984893 kernel: pci 0000:06:00.0:   bridge window [io  0x3000-0x3fff]
Sep  4 18:47:45.984943 kernel: pci 0000:06:00.0:   bridge window [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.984951 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0
Sep  4 18:47:45.984959 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1
Sep  4 18:47:45.984965 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0
Sep  4 18:47:45.984971 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0
Sep  4 18:47:45.984976 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0
Sep  4 18:47:45.984982 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0
Sep  4 18:47:45.984987 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0
Sep  4 18:47:45.984993 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0
Sep  4 18:47:45.984999 kernel: iommu: Default domain type: Translated
Sep  4 18:47:45.985004 kernel: iommu: DMA domain TLB invalidation policy: lazy mode
Sep  4 18:47:45.985011 kernel: PCI: Using ACPI for IRQ routing
Sep  4 18:47:45.985017 kernel: PCI: pci_cache_line_size set to 64 bytes
Sep  4 18:47:45.985022 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff]
Sep  4 18:47:45.985028 kernel: e820: reserve RAM buffer [mem 0x819cf000-0x83ffffff]
Sep  4 18:47:45.985033 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff]
Sep  4 18:47:45.985038 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff]
Sep  4 18:47:45.985044 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff]
Sep  4 18:47:45.985049 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff]
Sep  4 18:47:45.985098 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device
Sep  4 18:47:45.985154 kernel: pci 0000:07:00.0: vgaarb: bridge control possible
Sep  4 18:47:45.985205 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Sep  4 18:47:45.985214 kernel: vgaarb: loaded
Sep  4 18:47:45.985220 kernel: clocksource: Switched to clocksource tsc-early
Sep  4 18:47:45.985225 kernel: VFS: Disk quotas dquot_6.6.0
Sep  4 18:47:45.985231 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Sep  4 18:47:45.985238 kernel: pnp: PnP ACPI init
Sep  4 18:47:45.985290 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved
Sep  4 18:47:45.985339 kernel: pnp 00:02: [dma 0 disabled]
Sep  4 18:47:45.985387 kernel: pnp 00:03: [dma 0 disabled]
Sep  4 18:47:45.985436 kernel: system 00:04: [io  0x0680-0x069f] has been reserved
Sep  4 18:47:45.985481 kernel: system 00:04: [io  0x164e-0x164f] has been reserved
Sep  4 18:47:45.985528 kernel: system 00:05: [io  0x1854-0x1857] has been reserved
Sep  4 18:47:45.985573 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved
Sep  4 18:47:45.985620 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved
Sep  4 18:47:45.985662 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved
Sep  4 18:47:45.985705 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved
Sep  4 18:47:45.985747 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved
Sep  4 18:47:45.985790 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved
Sep  4 18:47:45.985832 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved
Sep  4 18:47:45.985875 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved
Sep  4 18:47:45.985921 kernel: system 00:07: [io  0x1800-0x18fe] could not be reserved
Sep  4 18:47:45.985968 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved
Sep  4 18:47:45.986013 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved
Sep  4 18:47:45.986057 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved
Sep  4 18:47:45.986099 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved
Sep  4 18:47:45.986146 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved
Sep  4 18:47:45.986189 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved
Sep  4 18:47:45.986239 kernel: system 00:08: [io  0x2000-0x20fe] has been reserved
Sep  4 18:47:45.986248 kernel: pnp: PnP ACPI: found 10 devices
Sep  4 18:47:45.986254 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Sep  4 18:47:45.986259 kernel: NET: Registered PF_INET protocol family
Sep  4 18:47:45.986265 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Sep  4 18:47:45.986271 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear)
Sep  4 18:47:45.986277 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Sep  4 18:47:45.986282 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Sep  4 18:47:45.986290 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear)
Sep  4 18:47:45.986295 kernel: TCP: Hash tables configured (established 262144 bind 65536)
Sep  4 18:47:45.986301 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear)
Sep  4 18:47:45.986306 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear)
Sep  4 18:47:45.986312 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Sep  4 18:47:45.986318 kernel: NET: Registered PF_XDP protocol family
Sep  4 18:47:45.986366 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit]
Sep  4 18:47:45.986415 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit]
Sep  4 18:47:45.986464 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit]
Sep  4 18:47:45.986517 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref]
Sep  4 18:47:45.986567 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref]
Sep  4 18:47:45.986617 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref]
Sep  4 18:47:45.986667 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref]
Sep  4 18:47:45.986715 kernel: pci 0000:00:01.0: PCI bridge to [bus 01]
Sep  4 18:47:45.986763 kernel: pci 0000:00:01.0:   bridge window [mem 0x95100000-0x952fffff]
Sep  4 18:47:45.986810 kernel: pci 0000:00:01.0:   bridge window [mem 0x90000000-0x93ffffff 64bit pref]
Sep  4 18:47:45.986859 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02]
Sep  4 18:47:45.986909 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03]
Sep  4 18:47:45.986956 kernel: pci 0000:00:1b.4:   bridge window [io  0x5000-0x5fff]
Sep  4 18:47:45.987004 kernel: pci 0000:00:1b.4:   bridge window [mem 0x95400000-0x954fffff]
Sep  4 18:47:45.987051 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04]
Sep  4 18:47:45.987099 kernel: pci 0000:00:1b.5:   bridge window [io  0x4000-0x4fff]
Sep  4 18:47:45.987151 kernel: pci 0000:00:1b.5:   bridge window [mem 0x95300000-0x953fffff]
Sep  4 18:47:45.987199 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05]
Sep  4 18:47:45.987248 kernel: pci 0000:06:00.0: PCI bridge to [bus 07]
Sep  4 18:47:45.987297 kernel: pci 0000:06:00.0:   bridge window [io  0x3000-0x3fff]
Sep  4 18:47:45.987346 kernel: pci 0000:06:00.0:   bridge window [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.987395 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07]
Sep  4 18:47:45.987442 kernel: pci 0000:00:1c.3:   bridge window [io  0x3000-0x3fff]
Sep  4 18:47:45.987493 kernel: pci 0000:00:1c.3:   bridge window [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.987536 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc
Sep  4 18:47:45.987582 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Sep  4 18:47:45.987624 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Sep  4 18:47:45.987665 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Sep  4 18:47:45.987706 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window]
Sep  4 18:47:45.987748 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window]
Sep  4 18:47:45.987797 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff]
Sep  4 18:47:45.987841 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref]
Sep  4 18:47:45.987894 kernel: pci_bus 0000:03: resource 0 [io  0x5000-0x5fff]
Sep  4 18:47:45.987938 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff]
Sep  4 18:47:45.987987 kernel: pci_bus 0000:04: resource 0 [io  0x4000-0x4fff]
Sep  4 18:47:45.988030 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff]
Sep  4 18:47:45.988078 kernel: pci_bus 0000:06: resource 0 [io  0x3000-0x3fff]
Sep  4 18:47:45.988121 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.988173 kernel: pci_bus 0000:07: resource 0 [io  0x3000-0x3fff]
Sep  4 18:47:45.988218 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff]
Sep  4 18:47:45.988226 kernel: PCI: CLS 64 bytes, default 64
Sep  4 18:47:45.988232 kernel: DMAR: No ATSR found
Sep  4 18:47:45.988238 kernel: DMAR: No SATC found
Sep  4 18:47:45.988244 kernel: DMAR: dmar0: Using Queued invalidation
Sep  4 18:47:45.988292 kernel: pci 0000:00:00.0: Adding to iommu group 0
Sep  4 18:47:45.988340 kernel: pci 0000:00:01.0: Adding to iommu group 1
Sep  4 18:47:45.988390 kernel: pci 0000:00:08.0: Adding to iommu group 2
Sep  4 18:47:45.988437 kernel: pci 0000:00:12.0: Adding to iommu group 3
Sep  4 18:47:45.988485 kernel: pci 0000:00:14.0: Adding to iommu group 4
Sep  4 18:47:45.988533 kernel: pci 0000:00:14.2: Adding to iommu group 4
Sep  4 18:47:45.988580 kernel: pci 0000:00:15.0: Adding to iommu group 5
Sep  4 18:47:45.988628 kernel: pci 0000:00:15.1: Adding to iommu group 5
Sep  4 18:47:45.988676 kernel: pci 0000:00:16.0: Adding to iommu group 6
Sep  4 18:47:45.988724 kernel: pci 0000:00:16.1: Adding to iommu group 6
Sep  4 18:47:45.988773 kernel: pci 0000:00:16.4: Adding to iommu group 6
Sep  4 18:47:45.988820 kernel: pci 0000:00:17.0: Adding to iommu group 7
Sep  4 18:47:45.988867 kernel: pci 0000:00:1b.0: Adding to iommu group 8
Sep  4 18:47:45.988915 kernel: pci 0000:00:1b.4: Adding to iommu group 9
Sep  4 18:47:45.988962 kernel: pci 0000:00:1b.5: Adding to iommu group 10
Sep  4 18:47:45.989009 kernel: pci 0000:00:1c.0: Adding to iommu group 11
Sep  4 18:47:45.989055 kernel: pci 0000:00:1c.3: Adding to iommu group 12
Sep  4 18:47:45.989103 kernel: pci 0000:00:1e.0: Adding to iommu group 13
Sep  4 18:47:45.989153 kernel: pci 0000:00:1f.0: Adding to iommu group 14
Sep  4 18:47:45.989203 kernel: pci 0000:00:1f.4: Adding to iommu group 14
Sep  4 18:47:45.989251 kernel: pci 0000:00:1f.5: Adding to iommu group 14
Sep  4 18:47:45.989300 kernel: pci 0000:01:00.0: Adding to iommu group 1
Sep  4 18:47:45.989351 kernel: pci 0000:01:00.1: Adding to iommu group 1
Sep  4 18:47:45.989399 kernel: pci 0000:03:00.0: Adding to iommu group 15
Sep  4 18:47:45.989449 kernel: pci 0000:04:00.0: Adding to iommu group 16
Sep  4 18:47:45.989498 kernel: pci 0000:06:00.0: Adding to iommu group 17
Sep  4 18:47:45.989549 kernel: pci 0000:07:00.0: Adding to iommu group 17
Sep  4 18:47:45.989559 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O
Sep  4 18:47:45.989565 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Sep  4 18:47:45.989571 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB)
Sep  4 18:47:45.989577 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer
Sep  4 18:47:45.989582 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules
Sep  4 18:47:45.989588 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules
Sep  4 18:47:45.989594 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules
Sep  4 18:47:45.989644 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found)
Sep  4 18:47:45.989654 kernel: Initialise system trusted keyrings
Sep  4 18:47:45.989660 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0
Sep  4 18:47:45.989665 kernel: Key type asymmetric registered
Sep  4 18:47:45.989671 kernel: Asymmetric key parser 'x509' registered
Sep  4 18:47:45.989676 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251)
Sep  4 18:47:45.989682 kernel: io scheduler mq-deadline registered
Sep  4 18:47:45.989688 kernel: io scheduler kyber registered
Sep  4 18:47:45.989693 kernel: io scheduler bfq registered
Sep  4 18:47:45.989741 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121
Sep  4 18:47:45.989792 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122
Sep  4 18:47:45.989841 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123
Sep  4 18:47:45.989890 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124
Sep  4 18:47:45.989937 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125
Sep  4 18:47:45.989985 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126
Sep  4 18:47:45.990037 kernel: thermal LNXTHERM:00: registered as thermal_zone0
Sep  4 18:47:45.990046 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C)
Sep  4 18:47:45.990053 kernel: ERST: Error Record Serialization Table (ERST) support is initialized.
Sep  4 18:47:45.990059 kernel: pstore: Using crash dump compression: deflate
Sep  4 18:47:45.990065 kernel: pstore: Registered erst as persistent store backend
Sep  4 18:47:45.990070 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Sep  4 18:47:45.990076 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Sep  4 18:47:45.990082 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Sep  4 18:47:45.990087 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Sep  4 18:47:45.990093 kernel: hpet_acpi_add: no address or irqs in _CRS
Sep  4 18:47:45.990147 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16)
Sep  4 18:47:45.990157 kernel: i8042: PNP: No PS/2 controller found.
Sep  4 18:47:45.990200 kernel: rtc_cmos rtc_cmos: RTC can wake from S4
Sep  4 18:47:45.990245 kernel: rtc_cmos rtc_cmos: registered as rtc0
Sep  4 18:47:45.990289 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-09-04T18:47:44 UTC (1725475664)
Sep  4 18:47:45.990333 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram
Sep  4 18:47:45.990341 kernel: intel_pstate: Intel P-state driver initializing
Sep  4 18:47:45.990347 kernel: intel_pstate: Disabling energy efficiency optimization
Sep  4 18:47:45.990354 kernel: intel_pstate: HWP enabled
Sep  4 18:47:45.990360 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0
Sep  4 18:47:45.990365 kernel: vesafb: scrolling: redraw
Sep  4 18:47:45.990371 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0
Sep  4 18:47:45.990377 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000006a250863, using 768k, total 768k
Sep  4 18:47:45.990382 kernel: Console: switching to colour frame buffer device 128x48
Sep  4 18:47:45.990388 kernel: fb0: VESA VGA frame buffer device
Sep  4 18:47:45.990393 kernel: NET: Registered PF_INET6 protocol family
Sep  4 18:47:45.990399 kernel: Segment Routing with IPv6
Sep  4 18:47:45.990404 kernel: In-situ OAM (IOAM) with IPv6
Sep  4 18:47:45.990411 kernel: NET: Registered PF_PACKET protocol family
Sep  4 18:47:45.990417 kernel: Key type dns_resolver registered
Sep  4 18:47:45.990422 kernel: microcode: Microcode Update Driver: v2.2.
Sep  4 18:47:45.990428 kernel: IPI shorthand broadcast: enabled
Sep  4 18:47:45.990433 kernel: sched_clock: Marking stable (2537000541, 1380259331)->(4451082000, -533822128)
Sep  4 18:47:45.990439 kernel: registered taskstats version 1
Sep  4 18:47:45.990445 kernel: Loading compiled-in X.509 certificates
Sep  4 18:47:45.990450 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.6.48-flatcar: a53bb4e7e3319f75620f709d8a6c7aef0adb3b02'
Sep  4 18:47:45.990456 kernel: Key type .fscrypt registered
Sep  4 18:47:45.990462 kernel: Key type fscrypt-provisioning registered
Sep  4 18:47:45.990468 kernel: ima: Allocated hash algorithm: sha1
Sep  4 18:47:45.990473 kernel: ima: No architecture policies found
Sep  4 18:47:45.990479 kernel: clk: Disabling unused clocks
Sep  4 18:47:45.990485 kernel: Freeing unused kernel image (initmem) memory: 49336K
Sep  4 18:47:45.990490 kernel: Write protecting the kernel read-only data: 36864k
Sep  4 18:47:45.990496 kernel: Freeing unused kernel image (rodata/data gap) memory: 1936K
Sep  4 18:47:45.990502 kernel: Run /init as init process
Sep  4 18:47:45.990508 kernel:   with arguments:
Sep  4 18:47:45.990514 kernel:     /init
Sep  4 18:47:45.990519 kernel:   with environment:
Sep  4 18:47:45.990525 kernel:     HOME=/
Sep  4 18:47:45.990530 kernel:     TERM=linux
Sep  4 18:47:45.990536 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Sep  4 18:47:45.990542 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified)
Sep  4 18:47:45.990549 systemd[1]: Detected architecture x86-64.
Sep  4 18:47:45.990557 systemd[1]: Running in initrd.
Sep  4 18:47:45.990562 systemd[1]: No hostname configured, using default hostname.
Sep  4 18:47:45.990568 systemd[1]: Hostname set to <localhost>.
Sep  4 18:47:45.990574 systemd[1]: Initializing machine ID from random generator.
Sep  4 18:47:45.990580 systemd[1]: Queued start job for default target initrd.target.
Sep  4 18:47:45.990586 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch.
Sep  4 18:47:45.990592 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch.
Sep  4 18:47:45.990598 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM...
Sep  4 18:47:45.990605 systemd[1]: Expecting device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT...
Sep  4 18:47:45.990611 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-ROOT.device - /dev/disk/by-partlabel/ROOT...
Sep  4 18:47:45.990617 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A...
Sep  4 18:47:45.990623 systemd[1]: Expecting device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132...
Sep  4 18:47:45.990629 systemd[1]: Expecting device dev-mapper-usr.device - /dev/mapper/usr...
Sep  4 18:47:45.990635 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz
Sep  4 18:47:45.990641 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns
Sep  4 18:47:45.990648 kernel: clocksource: Switched to clocksource tsc
Sep  4 18:47:45.990653 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre).
Sep  4 18:47:45.990659 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Sep  4 18:47:45.990665 systemd[1]: Reached target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup.
Sep  4 18:47:45.990671 systemd[1]: Reached target paths.target - Path Units.
Sep  4 18:47:45.990677 systemd[1]: Reached target slices.target - Slice Units.
Sep  4 18:47:45.990683 systemd[1]: Reached target swap.target - Swaps.
Sep  4 18:47:45.990689 systemd[1]: Reached target timers.target - Timer Units.
Sep  4 18:47:45.990695 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket.
Sep  4 18:47:45.990702 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket.
Sep  4 18:47:45.990707 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log).
Sep  4 18:47:45.990713 systemd[1]: Listening on systemd-journald.socket - Journal Socket.
Sep  4 18:47:45.990719 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
Sep  4 18:47:45.990725 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
Sep  4 18:47:45.990731 systemd[1]: Reached target sockets.target - Socket Units.
Sep  4 18:47:45.990737 systemd[1]: Starting ignition-setup-pre.service - Ignition env setup...
Sep  4 18:47:45.990743 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
Sep  4 18:47:45.990750 systemd[1]: Starting systemd-fsck-usr.service...
Sep  4 18:47:45.990756 systemd[1]: Starting systemd-journald.service - Journal Service...
Sep  4 18:47:45.990772 systemd-journald[260]: Collecting audit messages is disabled.
Sep  4 18:47:45.990785 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
Sep  4 18:47:45.990793 systemd-journald[260]: Journal started
Sep  4 18:47:45.990807 systemd-journald[260]: Runtime Journal (/run/log/journal/d55241cd9f0746bca9ee0ac964166eb2) is 8.0M, max 639.9M, 631.9M free.
Sep  4 18:47:46.006943 systemd-modules-load[262]: Inserted module 'overlay'
Sep  4 18:47:46.038176 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup...
Sep  4 18:47:46.081188 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Sep  4 18:47:46.081205 systemd[1]: Started systemd-journald.service - Journal Service.
Sep  4 18:47:46.100420 systemd[1]: Finished ignition-setup-pre.service - Ignition env setup.
Sep  4 18:47:46.117838 systemd-modules-load[262]: Inserted module 'br_netfilter'
Sep  4 18:47:46.118142 kernel: Bridge firewalling registered
Sep  4 18:47:46.142554 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
Sep  4 18:47:46.154456 systemd[1]: Finished systemd-fsck-usr.service.
Sep  4 18:47:46.166519 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
Sep  4 18:47:46.191516 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:46.236389 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters...
Sep  4 18:47:46.236915 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
Sep  4 18:47:46.237362 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully...
Sep  4 18:47:46.237856 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
Sep  4 18:47:46.242553 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully.
Sep  4 18:47:46.243390 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
Sep  4 18:47:46.243496 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
Sep  4 18:47:46.244350 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Sep  4 18:47:46.246563 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters.
Sep  4 18:47:46.288544 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Sep  4 18:47:46.310578 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook...
Sep  4 18:47:46.365173 dracut-cmdline[300]: dracut-dracut-053
Sep  4 18:47:46.373373 dracut-cmdline[300]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=6662bd39fec77da4c9a5c59d2cba257325976309ed96904c83697df1825085bf
Sep  4 18:47:46.575171 kernel: SCSI subsystem initialized
Sep  4 18:47:46.598171 kernel: Loading iSCSI transport class v2.0-870.
Sep  4 18:47:46.623191 kernel: iscsi: registered transport (tcp)
Sep  4 18:47:46.657237 kernel: iscsi: registered transport (qla4xxx)
Sep  4 18:47:46.657253 kernel: QLogic iSCSI HBA Driver
Sep  4 18:47:46.690457 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook.
Sep  4 18:47:46.709445 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook...
Sep  4 18:47:46.797238 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Sep  4 18:47:46.797259 kernel: device-mapper: uevent: version 1.0.3
Sep  4 18:47:46.817204 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@redhat.com
Sep  4 18:47:46.878216 kernel: raid6: avx2x4   gen() 51602 MB/s
Sep  4 18:47:46.910221 kernel: raid6: avx2x2   gen() 51900 MB/s
Sep  4 18:47:46.946983 kernel: raid6: avx2x1   gen() 44359 MB/s
Sep  4 18:47:46.947000 kernel: raid6: using algorithm avx2x2 gen() 51900 MB/s
Sep  4 18:47:46.994941 kernel: raid6: .... xor() 30370 MB/s, rmw enabled
Sep  4 18:47:46.994958 kernel: raid6: using avx2x2 recovery algorithm
Sep  4 18:47:47.040185 kernel: xor: automatically using best checksumming function   avx       
Sep  4 18:47:47.168213 kernel: Btrfs loaded, zoned=no, fsverity=no
Sep  4 18:47:47.174309 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook.
Sep  4 18:47:47.201497 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
Sep  4 18:47:47.207998 systemd-udevd[487]: Using default interface naming scheme 'v255'.
Sep  4 18:47:47.210397 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
Sep  4 18:47:47.241345 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook...
Sep  4 18:47:47.311239 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation
Sep  4 18:47:47.331874 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook.
Sep  4 18:47:47.358431 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
Sep  4 18:47:47.441837 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
Sep  4 18:47:47.501265 kernel: pps_core: LinuxPPS API ver. 1 registered
Sep  4 18:47:47.501287 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Sep  4 18:47:47.501305 kernel: cryptd: max_cpu_qlen set to 1000
Sep  4 18:47:47.468045 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Sep  4 18:47:47.583536 kernel: libata version 3.00 loaded.
Sep  4 18:47:47.583550 kernel: PTP clock support registered
Sep  4 18:47:47.583560 kernel: ACPI: bus type USB registered
Sep  4 18:47:47.583568 kernel: usbcore: registered new interface driver usbfs
Sep  4 18:47:47.583577 kernel: usbcore: registered new interface driver hub
Sep  4 18:47:47.583587 kernel: usbcore: registered new device driver usb
Sep  4 18:47:47.468108 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters.
Sep  4 18:47:47.622575 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Sep  4 18:47:47.622701 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1
Sep  4 18:47:47.622768 kernel: AVX2 version of gcm_enc/dec engaged.
Sep  4 18:47:47.583493 systemd[1]: Stopping dracut-cmdline-ask.service - dracut ask for additional cmdline parameters...
Sep  4 18:47:48.299278 kernel: ahci 0000:00:17.0: version 3.0
Sep  4 18:47:48.299377 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810
Sep  4 18:47:48.299445 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Sep  4 18:47:48.299507 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2
Sep  4 18:47:48.299569 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed
Sep  4 18:47:48.299629 kernel: hub 1-0:1.0: USB hub found
Sep  4 18:47:48.299702 kernel: hub 1-0:1.0: 16 ports detected
Sep  4 18:47:48.299768 kernel: hub 2-0:1.0: USB hub found
Sep  4 18:47:48.299840 kernel: hub 2-0:1.0: 10 ports detected
Sep  4 18:47:48.299904 kernel: AES CTR mode by8 optimization enabled
Sep  4 18:47:48.299914 kernel: igb: Intel(R) Gigabit Ethernet Network Driver
Sep  4 18:47:48.299921 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode
Sep  4 18:47:48.299981 kernel: igb: Copyright (c) 2007-2014 Intel Corporation.
Sep  4 18:47:48.299990 kernel: pps pps0: new PPS source ptp0
Sep  4 18:47:48.300051 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst 
Sep  4 18:47:48.300114 kernel: igb 0000:03:00.0: added PHC on eth0
Sep  4 18:47:48.300185 kernel: scsi host0: ahci
Sep  4 18:47:48.300249 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection
Sep  4 18:47:48.300324 kernel: scsi host1: ahci
Sep  4 18:47:48.300384 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:b6
Sep  4 18:47:48.300445 kernel: scsi host2: ahci
Sep  4 18:47:48.300508 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000
Sep  4 18:47:48.300572 kernel: scsi host3: ahci
Sep  4 18:47:48.300633 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s)
Sep  4 18:47:48.300694 kernel: scsi host4: ahci
Sep  4 18:47:48.300752 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd
Sep  4 18:47:48.300845 kernel: scsi host5: ahci
Sep  4 18:47:48.300905 kernel: pps pps1: new PPS source ptp1
Sep  4 18:47:48.300963 kernel: scsi host6: ahci
Sep  4 18:47:48.301026 kernel: igb 0000:04:00.0: added PHC on eth1
Sep  4 18:47:48.301092 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 128
Sep  4 18:47:48.301100 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection
Sep  4 18:47:48.301167 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 128
Sep  4 18:47:48.301176 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:b7
Sep  4 18:47:48.301236 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 128
Sep  4 18:47:48.301244 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000
Sep  4 18:47:48.301306 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 128
Sep  4 18:47:48.301314 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s)
Sep  4 18:47:48.301374 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 128
Sep  4 18:47:48.301383 kernel: hub 1-14:1.0: USB hub found
Sep  4 18:47:48.301455 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 128
Sep  4 18:47:48.301464 kernel: hub 1-14:1.0: 4 ports detected
Sep  4 18:47:48.301529 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 128
Sep  4 18:47:48.301539 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014
Sep  4 18:47:48.301604 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link)
Sep  4 18:47:47.612830 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Sep  4 18:47:47.612947 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:48.280940 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup...
Sep  4 18:47:48.343247 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup...
Sep  4 18:47:48.379192 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd
Sep  4 18:47:48.391000 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:48.414329 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters...
Sep  4 18:47:48.423327 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters.
Sep  4 18:47:48.495222 kernel: hid: raw HID events driver (C) Jiri Kosina
Sep  4 18:47:48.592148 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048)
Sep  4 18:47:48.592262 kernel: ata4: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.597173 kernel: mlx5_core 0000:01:00.0: Port module event: module 0, Cable plugged
Sep  4 18:47:48.597277 kernel: ata3: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.644143 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
Sep  4 18:47:48.661142 kernel: ata5: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.678180 kernel: ata6: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.694176 kernel: ata7: SATA link down (SStatus 0 SControl 300)
Sep  4 18:47:48.710173 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN,  D1MU020, max UDMA/133
Sep  4 18:47:48.728148 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
Sep  4 18:47:48.753034 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN,  D1MU020, max UDMA/133
Sep  4 18:47:48.788608 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA
Sep  4 18:47:48.788626 kernel: ata2.00: Features: NCQ-prio
Sep  4 18:47:48.822482 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA
Sep  4 18:47:48.822538 kernel: ata1.00: Features: NCQ-prio
Sep  4 18:47:48.853180 kernel: ata2.00: configured for UDMA/133
Sep  4 18:47:48.853238 kernel: ata1.00: configured for UDMA/133
Sep  4 18:47:48.868144 kernel: scsi 0:0:0:0: Direct-Access     ATA      Micron_5200_MTFD U020 PQ: 0 ANSI: 5
Sep  4 18:47:48.887227 kernel: scsi 1:0:0:0: Direct-Access     ATA      Micron_5200_MTFD U020 PQ: 0 ANSI: 5
Sep  4 18:47:48.895145 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic)
Sep  4 18:47:48.930148 kernel: igb 0000:03:00.0 eno1: renamed from eth0
Sep  4 18:47:48.930268 kernel: usbcore: registered new interface driver usbhid
Sep  4 18:47:48.930277 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014
Sep  4 18:47:48.930345 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link)
Sep  4 18:47:48.998702 kernel: usbhid: USB HID core driver
Sep  4 18:47:49.023158 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0
Sep  4 18:47:49.023195 kernel: igb 0000:04:00.0 eno2: renamed from eth1
Sep  4 18:47:49.082877 kernel: ata1.00: Enabling discard_zeroes_data
Sep  4 18:47:49.082915 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0
Sep  4 18:47:49.083173 kernel: ata2.00: Enabling discard_zeroes_data
Sep  4 18:47:49.083190 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB)
Sep  4 18:47:49.083370 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB)
Sep  4 18:47:49.083542 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks
Sep  4 18:47:49.083701 kernel: sd 1:0:0:0: [sdb] Write Protect is off
Sep  4 18:47:49.083868 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00
Sep  4 18:47:49.084023 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Sep  4 18:47:49.084208 kernel: sd 1:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes
Sep  4 18:47:49.084371 kernel: ata2.00: Enabling discard_zeroes_data
Sep  4 18:47:49.084387 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk
Sep  4 18:47:49.095143 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1
Sep  4 18:47:49.106817 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks
Sep  4 18:47:49.106901 kernel: sd 0:0:0:0: [sda] Write Protect is off
Sep  4 18:47:49.106965 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1
Sep  4 18:47:49.114298 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
Sep  4 18:47:49.240259 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048)
Sep  4 18:47:49.240356 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Sep  4 18:47:49.250265 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged
Sep  4 18:47:49.250351 kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes
Sep  4 18:47:49.465275 kernel: ata1.00: Enabling discard_zeroes_data
Sep  4 18:47:49.492597 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Sep  4 18:47:49.492614 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic)
Sep  4 18:47:49.492696 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
Sep  4 18:47:49.541178 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0
Sep  4 18:47:49.561875 systemd[1]: Found device dev-disk-by\x2dpartlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT.
Sep  4 18:47:49.659393 kernel: BTRFS: device fsid d110be6f-93a3-451a-b365-11b5d04e0602 devid 1 transid 33 /dev/sda3 scanned by (udev-worker) (552)
Sep  4 18:47:49.659412 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2
Sep  4 18:47:49.659532 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (673)
Sep  4 18:47:49.638254 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT.
Sep  4 18:47:49.641563 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5200_MTFDDAK480TDN USR-A.
Sep  4 18:47:49.670375 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5200_MTFDDAK480TDN USR-A.
Sep  4 18:47:49.699204 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5200_MTFDDAK480TDN OEM.
Sep  4 18:47:49.723048 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device.
Sep  4 18:47:49.757483 systemd[1]: Starting decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition...
Sep  4 18:47:49.777747 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary...
Sep  4 18:47:49.802434 systemd[1]: Finished decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition.
Sep  4 18:47:49.826941 systemd[1]: disk-uuid.service: Deactivated successfully.
Sep  4 18:47:49.827117 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary.
Sep  4 18:47:49.852321 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems.
Sep  4 18:47:49.870415 systemd[1]: Reached target local-fs.target - Local File Systems.
Sep  4 18:47:49.893432 systemd[1]: Reached target sysinit.target - System Initialization.
Sep  4 18:47:49.914469 systemd[1]: Reached target basic.target - Basic System.
Sep  4 18:47:49.945553 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook...
Sep  4 18:47:49.952018 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr...
Sep  4 18:47:50.001469 sh[718]: Success
Sep  4 18:47:50.009086 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook.
Sep  4 18:47:50.034262 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2"
Sep  4 18:47:50.009732 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems.
Sep  4 18:47:50.045246 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep  4 18:47:50.076244 systemd[1]: Reached target remote-fs.target - Remote File Systems.
Sep  4 18:47:50.093400 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook...
Sep  4 18:47:50.108187 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr.
Sep  4 18:47:50.114046 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr...
Sep  4 18:47:50.145881 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr.
Sep  4 18:47:50.159642 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook.
Sep  4 18:47:50.297708 kernel: BTRFS info (device dm-0): first mount of filesystem d110be6f-93a3-451a-b365-11b5d04e0602
Sep  4 18:47:50.297721 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm
Sep  4 18:47:50.297729 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead
Sep  4 18:47:50.297736 kernel: BTRFS info (device dm-0): disabling log replay at mount time
Sep  4 18:47:50.297744 kernel: BTRFS info (device dm-0): using free space tree
Sep  4 18:47:50.297750 kernel: BTRFS info (device dm-0): enabling ssd optimizations
Sep  4 18:47:50.300507 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT...
Sep  4 18:47:50.311681 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr.
Sep  4 18:47:50.337832 systemd-fsck[768]: ROOT: clean, 81/553520 files, 52718/553472 blocks
Sep  4 18:47:50.349902 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT.
Sep  4 18:47:50.369344 systemd[1]: Mounting sysroot.mount - /sysroot...
Sep  4 18:47:50.492145 kernel: EXT4-fs (sda9): mounted filesystem 84a5cefa-c3c7-47d7-9305-7e6877f73628 r/w with ordered data mode. Quota mode: none.
Sep  4 18:47:50.492210 systemd[1]: Mounted sysroot.mount - /sysroot.
Sep  4 18:47:50.492507 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System.
Sep  4 18:47:50.527329 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem...
Sep  4 18:47:50.529810 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr...
Sep  4 18:47:50.587198 kernel: BTRFS info (device sda6): first mount of filesystem 50e7422b-f0c7-4536-902a-3ab4c864240b
Sep  4 18:47:50.587216 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Sep  4 18:47:50.606385 kernel: BTRFS info (device sda6): using free space tree
Sep  4 18:47:50.648693 kernel: BTRFS info (device sda6): enabling ssd optimizations
Sep  4 18:47:50.648711 kernel: BTRFS info (device sda6): auto enabling async discard
Sep  4 18:47:50.663994 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem.
Sep  4 18:47:50.672972 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr.
Sep  4 18:47:50.694271 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup...
Sep  4 18:47:50.767633 initrd-setup-root[800]: cut: /sysroot/etc/passwd: No such file or directory
Sep  4 18:47:50.777258 initrd-setup-root[807]: cut: /sysroot/etc/group: No such file or directory
Sep  4 18:47:50.787257 initrd-setup-root[814]: cut: /sysroot/etc/shadow: No such file or directory
Sep  4 18:47:50.797262 initrd-setup-root[821]: cut: /sysroot/etc/gshadow: No such file or directory
Sep  4 18:47:50.870877 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup.
Sep  4 18:47:50.901616 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion...
Sep  4 18:47:50.922804 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion.
Sep  4 18:47:50.945427 initrd-setup-root-after-ignition[965]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Sep  4 18:47:50.945427 initrd-setup-root-after-ignition[965]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory
Sep  4 18:47:50.935320 systemd[1]: Reached target ignition-subsequent.target - Subsequent (Not Ignition) boot complete.
Sep  4 18:47:51.007470 initrd-setup-root-after-ignition[969]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Sep  4 18:47:50.970359 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root...
Sep  4 18:47:51.035926 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Sep  4 18:47:51.035999 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root.
Sep  4 18:47:51.055977 systemd[1]: Reached target initrd-fs.target - Initrd File Systems.
Sep  4 18:47:51.077448 systemd[1]: Reached target initrd.target - Initrd Default Target.
Sep  4 18:47:51.097546 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met.
Sep  4 18:47:51.115339 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook...
Sep  4 18:47:51.163041 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
Sep  4 18:47:51.191530 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons...
Sep  4 18:47:51.219691 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep  4 18:47:51.231671 systemd[1]: Stopped target timers.target - Timer Units.
Sep  4 18:47:51.250694 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Sep  4 18:47:51.251060 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
Sep  4 18:47:51.288530 systemd[1]: Stopped target initrd.target - Initrd Default Target.
Sep  4 18:47:51.298716 systemd[1]: Stopped target basic.target - Basic System.
Sep  4 18:47:51.317743 systemd[1]: Stopped target ignition-subsequent.target - Subsequent (Not Ignition) boot complete.
Sep  4 18:47:51.338718 systemd[1]: Stopped target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup.
Sep  4 18:47:51.363703 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device.
Sep  4 18:47:51.387694 systemd[1]: Stopped target paths.target - Path Units.
Sep  4 18:47:51.407824 systemd[1]: Stopped target remote-fs.target - Remote File Systems.
Sep  4 18:47:51.426709 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems.
Sep  4 18:47:51.447710 systemd[1]: Stopped target slices.target - Slice Units.
Sep  4 18:47:51.467697 systemd[1]: Stopped target sockets.target - Socket Units.
Sep  4 18:47:51.486720 systemd[1]: Stopped target sysinit.target - System Initialization.
Sep  4 18:47:51.505834 systemd[1]: Stopped target local-fs.target - Local File Systems.
Sep  4 18:47:51.525693 systemd[1]: Stopped target swap.target - Swaps.
Sep  4 18:47:51.543671 systemd[1]: iscsid.socket: Deactivated successfully.
Sep  4 18:47:51.543941 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket.
Sep  4 18:47:51.560758 systemd[1]: iscsiuio.socket: Deactivated successfully.
Sep  4 18:47:51.561027 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket.
Sep  4 18:47:51.578821 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Sep  4 18:47:51.579188 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook.
Sep  4 18:47:51.606911 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes.
Sep  4 18:47:51.626592 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Sep  4 18:47:51.627017 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch.
Sep  4 18:47:51.647725 systemd[1]: Stopped target cryptsetup-pre.target - Local Encrypted Volumes (Pre).
Sep  4 18:47:51.669593 systemd[1]: clevis-luks-askpass.path: Deactivated successfully.
Sep  4 18:47:51.670003 systemd[1]: Stopped clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch.
Sep  4 18:47:51.691582 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Sep  4 18:47:51.691943 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook.
Sep  4 18:47:51.724637 systemd[1]: decrypt-root.service: Deactivated successfully.
Sep  4 18:47:51.725040 systemd[1]: Stopped decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition.
Sep  4 18:47:51.747763 systemd[1]: ignition-setup-pre.service: Deactivated successfully.
Sep  4 18:47:51.748105 systemd[1]: Stopped ignition-setup-pre.service - Ignition env setup.
Sep  4 18:47:51.766881 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Sep  4 18:47:51.767273 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion.
Sep  4 18:47:51.790782 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Sep  4 18:47:51.791123 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup.
Sep  4 18:47:51.809783 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Sep  4 18:47:51.810127 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes.
Sep  4 18:47:51.830774 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Sep  4 18:47:51.831114 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables.
Sep  4 18:47:51.849761 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Sep  4 18:47:51.850101 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules.
Sep  4 18:47:51.873773 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully.
Sep  4 18:47:51.874115 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Sep  4 18:47:51.894778 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Sep  4 18:47:51.895118 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices.
Sep  4 18:47:51.915775 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Sep  4 18:47:51.916114 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook.
Sep  4 18:47:51.949222 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files...
Sep  4 18:47:51.979818 systemd[1]: systemd-udevd.service: Deactivated successfully.
Sep  4 18:47:51.979908 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files.
Sep  4 18:47:51.989791 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Sep  4 18:47:51.989861 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons.
Sep  4 18:47:52.020471 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Sep  4 18:47:52.020624 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket.
Sep  4 18:47:52.039489 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Sep  4 18:47:52.039595 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket.
Sep  4 18:47:52.060592 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Sep  4 18:47:52.060754 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook.
Sep  4 18:47:52.101403 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Sep  4 18:47:52.101576 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook.
Sep  4 18:47:52.142388 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Sep  4 18:47:52.142560 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters.
Sep  4 18:47:52.198434 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database...
Sep  4 18:47:52.224334 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Sep  4 18:47:52.429214 systemd-journald[260]: Received SIGTERM from PID 1 (systemd).
Sep  4 18:47:52.224410 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Sep  4 18:47:52.247427 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Sep  4 18:47:52.247525 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:52.269380 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Sep  4 18:47:52.269605 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database.
Sep  4 18:47:52.290401 systemd[1]: Reached target initrd-switch-root.target - Switch Root.
Sep  4 18:47:52.320507 systemd[1]: Starting initrd-switch-root.service - Switch Root...
Sep  4 18:47:52.372582 systemd[1]: Switching root.
Sep  4 18:47:52.429431 systemd-journald[260]: Journal stopped
Sep  4 18:47:55.040364 kernel: SELinux:  policy capability network_peer_controls=1
Sep  4 18:47:55.040380 kernel: SELinux:  policy capability open_perms=1
Sep  4 18:47:55.040387 kernel: SELinux:  policy capability extended_socket_class=1
Sep  4 18:47:55.040394 kernel: SELinux:  policy capability always_check_network=0
Sep  4 18:47:55.040399 kernel: SELinux:  policy capability cgroup_seclabel=1
Sep  4 18:47:55.040404 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Sep  4 18:47:55.040410 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Sep  4 18:47:55.040415 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Sep  4 18:47:55.040421 kernel: audit: type=1403 audit(1725475672.639:2): auid=4294967295 ses=4294967295 lsm=selinux res=1
Sep  4 18:47:55.040427 systemd[1]: Successfully loaded SELinux policy in 168.556ms.
Sep  4 18:47:55.040435 systemd[1]: Relabeled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.853ms.
Sep  4 18:47:55.040442 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified)
Sep  4 18:47:55.040448 systemd[1]: Detected architecture x86-64.
Sep  4 18:47:55.040454 systemd[1]: Detected first boot.
Sep  4 18:47:55.040461 systemd[1]: Hostname set to <ci-3975.2.1-a-995ac3be18>.
Sep  4 18:47:55.040468 systemd[1]: Initializing machine ID from random generator.
Sep  4 18:47:55.040475 zram_generator::config[1011]: No configuration found.
Sep  4 18:47:55.040482 systemd[1]: Populated /etc with preset unit settings.
Sep  4 18:47:55.040489 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Sep  4 18:47:55.040495 systemd[1]: Stopped initrd-switch-root.service - Switch Root.
Sep  4 18:47:55.040501 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Sep  4 18:47:55.040508 systemd[1]: Created slice system-addon\x2dconfig.slice - Slice /system/addon-config.
Sep  4 18:47:55.040516 systemd[1]: Created slice system-addon\x2drun.slice - Slice /system/addon-run.
Sep  4 18:47:55.040522 systemd[1]: Created slice system-getty.slice - Slice /system/getty.
Sep  4 18:47:55.040529 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe.
Sep  4 18:47:55.040535 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty.
Sep  4 18:47:55.040542 systemd[1]: Created slice system-system\x2dcloudinit.slice - Slice /system/system-cloudinit.
Sep  4 18:47:55.040548 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck.
Sep  4 18:47:55.040555 systemd[1]: Created slice user.slice - User and Session Slice.
Sep  4 18:47:55.040562 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch.
Sep  4 18:47:55.040569 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch.
Sep  4 18:47:55.040575 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch.
Sep  4 18:47:55.040582 systemd[1]: Set up automount boot.automount - Boot partition Automount Point.
Sep  4 18:47:55.040588 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point.
Sep  4 18:47:55.040595 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM...
Sep  4 18:47:55.040601 systemd[1]: Expecting device dev-ttyS1.device - /dev/ttyS1...
Sep  4 18:47:55.040608 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre).
Sep  4 18:47:55.040615 systemd[1]: Stopped target initrd-switch-root.target - Switch Root.
Sep  4 18:47:55.040622 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems.
Sep  4 18:47:55.040628 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System.
Sep  4 18:47:55.040637 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes.
Sep  4 18:47:55.040643 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Sep  4 18:47:55.040650 systemd[1]: Reached target remote-fs.target - Remote File Systems.
Sep  4 18:47:55.040657 systemd[1]: Reached target slices.target - Slice Units.
Sep  4 18:47:55.040664 systemd[1]: Reached target swap.target - Swaps.
Sep  4 18:47:55.040671 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes.
Sep  4 18:47:55.040678 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket.
Sep  4 18:47:55.040684 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket.
Sep  4 18:47:55.040691 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
Sep  4 18:47:55.040697 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
Sep  4 18:47:55.040705 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket.
Sep  4 18:47:55.040712 systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System...
Sep  4 18:47:55.040719 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System...
Sep  4 18:47:55.040726 systemd[1]: Mounting media.mount - External Media Directory...
Sep  4 18:47:55.040733 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen).
Sep  4 18:47:55.040740 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System...
Sep  4 18:47:55.040747 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System...
Sep  4 18:47:55.040755 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp...
Sep  4 18:47:55.040762 systemd[1]: var-lib-machines.mount - Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Sep  4 18:47:55.040769 systemd[1]: Reached target machines.target - Containers.
Sep  4 18:47:55.040776 systemd[1]: Starting flatcar-tmpfiles.service - Create missing system files...
Sep  4 18:47:55.040783 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met.
Sep  4 18:47:55.040790 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
Sep  4 18:47:55.040798 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs...
Sep  4 18:47:55.040805 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Sep  4 18:47:55.040812 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm...
Sep  4 18:47:55.040819 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore...
Sep  4 18:47:55.040826 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse...
Sep  4 18:47:55.040833 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Sep  4 18:47:55.040839 kernel: ACPI: bus type drm_connector registered
Sep  4 18:47:55.040845 kernel: loop: module loaded
Sep  4 18:47:55.040852 systemd[1]: setup-nsswitch.service - Create /etc/nsswitch.conf was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Sep  4 18:47:55.040859 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Sep  4 18:47:55.040865 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device.
Sep  4 18:47:55.040873 kernel: fuse: init (API version 7.39)
Sep  4 18:47:55.040879 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Sep  4 18:47:55.040886 systemd[1]: Stopped systemd-fsck-usr.service.
Sep  4 18:47:55.040893 systemd[1]: Starting systemd-journald.service - Journal Service...
Sep  4 18:47:55.040907 systemd-journald[1113]: Collecting audit messages is disabled.
Sep  4 18:47:55.040925 systemd-journald[1113]: Journal started
Sep  4 18:47:55.040939 systemd-journald[1113]: Runtime Journal (/run/log/journal/46156ced210545c5a9b2eedd777b9f3f) is 8.0M, max 639.9M, 631.9M free.
Sep  4 18:47:53.172862 systemd[1]: Queued start job for default target multi-user.target.
Sep  4 18:47:53.192352 systemd[1]: Unnecessary job was removed for dev-sda6.device - /dev/sda6.
Sep  4 18:47:53.192632 systemd[1]: systemd-journald.service: Deactivated successfully.
Sep  4 18:47:55.069190 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
Sep  4 18:47:55.102160 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line...
Sep  4 18:47:55.137188 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems...
Sep  4 18:47:55.170185 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
Sep  4 18:47:55.203229 systemd[1]: verity-setup.service: Deactivated successfully.
Sep  4 18:47:55.203258 systemd[1]: Stopped verity-setup.service.
Sep  4 18:47:55.264187 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen).
Sep  4 18:47:55.285339 systemd[1]: Started systemd-journald.service - Journal Service.
Sep  4 18:47:55.295717 systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System.
Sep  4 18:47:55.306413 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System.
Sep  4 18:47:55.316405 systemd[1]: Mounted media.mount - External Media Directory.
Sep  4 18:47:55.326390 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System.
Sep  4 18:47:55.336371 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System.
Sep  4 18:47:55.346379 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp.
Sep  4 18:47:55.356517 systemd[1]: Finished flatcar-tmpfiles.service - Create missing system files.
Sep  4 18:47:55.367618 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
Sep  4 18:47:55.378994 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Sep  4 18:47:55.379384 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs.
Sep  4 18:47:55.391018 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Sep  4 18:47:55.391404 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Sep  4 18:47:55.403041 systemd[1]: modprobe@drm.service: Deactivated successfully.
Sep  4 18:47:55.403410 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm.
Sep  4 18:47:55.413975 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Sep  4 18:47:55.414320 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore.
Sep  4 18:47:55.425995 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Sep  4 18:47:55.426507 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse.
Sep  4 18:47:55.436995 systemd[1]: modprobe@loop.service: Deactivated successfully.
Sep  4 18:47:55.437354 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Sep  4 18:47:55.448003 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
Sep  4 18:47:55.458980 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line.
Sep  4 18:47:55.470995 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems.
Sep  4 18:47:55.482974 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
Sep  4 18:47:55.519660 systemd[1]: Reached target network-pre.target - Preparation for Network.
Sep  4 18:47:55.544388 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System...
Sep  4 18:47:55.554897 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System...
Sep  4 18:47:55.565357 systemd[1]: remount-root.service - Remount Root File System was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Sep  4 18:47:55.565378 systemd[1]: Reached target local-fs.target - Local File Systems.
Sep  4 18:47:55.566085 systemd[1]: Listening on systemd-sysext.socket - System Extension Image Management (Varlink).
Sep  4 18:47:55.587083 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown...
Sep  4 18:47:55.600437 systemd[1]: Starting ldconfig.service - Rebuild Dynamic Linker Cache...
Sep  4 18:47:55.611792 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met.
Sep  4 18:47:55.614068 systemd[1]: Starting systemd-hwdb-update.service - Rebuild Hardware Database...
Sep  4 18:47:55.623764 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage...
Sep  4 18:47:55.634272 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Sep  4 18:47:55.634994 systemd[1]: Starting systemd-random-seed.service - Load/Save OS Random Seed...
Sep  4 18:47:55.640610 systemd-journald[1113]: Time spent on flushing to /var/log/journal/46156ced210545c5a9b2eedd777b9f3f is 11.322ms for 1136 entries.
Sep  4 18:47:55.640610 systemd-journald[1113]: System Journal (/var/log/journal/46156ced210545c5a9b2eedd777b9f3f) is 8.0M, max 195.6M, 187.6M free.
Sep  4 18:47:55.677059 systemd-journald[1113]: Received client request to flush runtime journal.
Sep  4 18:47:55.653251 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met.
Sep  4 18:47:55.653846 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
Sep  4 18:47:55.663788 systemd[1]: Starting systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/...
Sep  4 18:47:55.688818 systemd[1]: Starting systemd-sysusers.service - Create System Users...
Sep  4 18:47:55.706882 systemd[1]: Starting systemd-udev-settle.service - Wait for udev To Complete Device Initialization...
Sep  4 18:47:55.712972 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System.
Sep  4 18:47:55.719839 kernel: loop0: detected capacity change from 0 to 139904
Sep  4 18:47:55.719860 kernel: block loop0: the capability attribute has been deprecated.
Sep  4 18:47:55.744314 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System.
Sep  4 18:47:55.755372 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown.
Sep  4 18:47:55.772393 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage.
Sep  4 18:47:55.777149 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
Sep  4 18:47:55.788364 systemd[1]: Finished systemd-random-seed.service - Load/Save OS Random Seed.
Sep  4 18:47:55.799381 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
Sep  4 18:47:55.809356 systemd[1]: Finished systemd-sysusers.service - Create System Users.
Sep  4 18:47:55.828226 systemd[1]: Reached target first-boot-complete.target - First Boot Complete.
Sep  4 18:47:55.835184 kernel: loop1: detected capacity change from 0 to 80568
Sep  4 18:47:55.861385 systemd[1]: Starting systemd-machine-id-commit.service - Commit a transient machine-id on disk...
Sep  4 18:47:55.873040 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
Sep  4 18:47:55.887240 udevadm[1149]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in.
Sep  4 18:47:55.900146 kernel: loop2: detected capacity change from 0 to 8
Sep  4 18:47:55.900213 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Sep  4 18:47:55.913426 systemd[1]: Finished systemd-machine-id-commit.service - Commit a transient machine-id on disk.
Sep  4 18:47:55.927526 systemd-tmpfiles[1162]: ACLs are not supported, ignoring.
Sep  4 18:47:55.927536 systemd-tmpfiles[1162]: ACLs are not supported, ignoring.
Sep  4 18:47:55.929814 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Sep  4 18:47:55.954533 ldconfig[1139]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Sep  4 18:47:55.955805 systemd[1]: Finished ldconfig.service - Rebuild Dynamic Linker Cache.
Sep  4 18:47:55.960188 kernel: loop3: detected capacity change from 0 to 139904
Sep  4 18:47:55.991193 kernel: loop4: detected capacity change from 0 to 80568
Sep  4 18:47:56.017187 kernel: loop5: detected capacity change from 0 to 8
Sep  4 18:47:56.017605 (sd-merge)[1166]: Using extensions 'containerd-flatcar', 'docker-flatcar', 'oem-packet'.
Sep  4 18:47:56.017816 (sd-merge)[1166]: Merged extensions into '/usr'.
Sep  4 18:47:56.019120 systemd[1]: Finished systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/.
Sep  4 18:47:56.042369 systemd[1]: Starting ensure-sysext.service...
Sep  4 18:47:56.049934 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
Sep  4 18:47:56.062553 systemd[1]: Finished systemd-hwdb-update.service - Rebuild Hardware Database.
Sep  4 18:47:56.070615 systemd-tmpfiles[1171]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Sep  4 18:47:56.070810 systemd-tmpfiles[1171]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring.
Sep  4 18:47:56.071312 systemd-tmpfiles[1171]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Sep  4 18:47:56.071474 systemd-tmpfiles[1171]: ACLs are not supported, ignoring.
Sep  4 18:47:56.071507 systemd-tmpfiles[1171]: ACLs are not supported, ignoring.
Sep  4 18:47:56.073622 systemd-tmpfiles[1171]: Detected autofs mount point /boot during canonicalization of boot.
Sep  4 18:47:56.073626 systemd-tmpfiles[1171]: Skipping /boot
Sep  4 18:47:56.076675 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
Sep  4 18:47:56.077683 systemd-tmpfiles[1171]: Detected autofs mount point /boot during canonicalization of boot.
Sep  4 18:47:56.077687 systemd-tmpfiles[1171]: Skipping /boot
Sep  4 18:47:56.091481 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Sep  4 18:47:56.100754 systemd-udevd[1174]: Using default interface naming scheme 'v255'.
Sep  4 18:47:56.102666 systemd[1]: Reloading requested from client PID 1170 ('systemctl') (unit ensure-sysext.service)...
Sep  4 18:47:56.102673 systemd[1]: Reloading...
Sep  4 18:47:56.143152 zram_generator::config[1261]: No configuration found.
Sep  4 18:47:56.143225 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2
Sep  4 18:47:56.143245 kernel: BTRFS info: devid 1 device path /dev/mapper/usr changed to /dev/dm-0 scanned by (udev-worker) (1189)
Sep  4 18:47:56.145295 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (1253)
Sep  4 18:47:56.239157 kernel: ACPI: button: Sleep Button [SLPB]
Sep  4 18:47:56.239254 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3
Sep  4 18:47:56.287220 kernel: ACPI: button: Power Button [PWRF]
Sep  4 18:47:56.303967 systemd[1]: /usr/lib/systemd/system/docker.socket:6: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Sep  4 18:47:56.308148 kernel: mousedev: PS/2 mouse device common for all mice
Sep  4 18:47:56.325153 kernel: IPMI message handler: version 39.2
Sep  4 18:47:56.327151 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface
Sep  4 18:47:56.327566 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface
Sep  4 18:47:56.327972 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set
Sep  4 18:47:56.328337 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt
Sep  4 18:47:56.328643 kernel: i2c i2c-0: 1/4 memory slots populated (from DMI)
Sep  4 18:47:56.363327 systemd[1]: Condition check resulted in dev-ttyS1.device - /dev/ttyS1 being skipped.
Sep  4 18:47:56.363478 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5200_MTFDDAK480TDN OEM.
Sep  4 18:47:56.416187 kernel: ipmi device interface
Sep  4 18:47:56.431394 systemd[1]: Reloading finished in 328 ms.
Sep  4 18:47:56.466145 kernel: iTCO_vendor_support: vendor-support=0
Sep  4 18:47:56.466173 kernel: ipmi_si: IPMI System Interface driver
Sep  4 18:47:56.489150 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS
Sep  4 18:47:56.506537 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0
Sep  4 18:47:56.523570 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine
Sep  4 18:47:56.535145 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI
Sep  4 18:47:56.559696 kernel: ipmi_si IPI0001:00: ipmi_platform: [io  0x0ca2] regsize 1 spacing 1 irq 0
Sep  4 18:47:56.579492 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI
Sep  4 18:47:56.595985 kernel: ipmi_si: Adding ACPI-specified kcs state machine
Sep  4 18:47:56.616596 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0
Sep  4 18:47:56.649146 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400)
Sep  4 18:47:56.649254 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
Sep  4 18:47:56.666146 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed.
Sep  4 18:47:56.727512 kernel: intel_rapl_common: Found RAPL domain package
Sep  4 18:47:56.727610 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20)
Sep  4 18:47:56.727706 kernel: intel_rapl_common: Found RAPL domain core
Sep  4 18:47:56.749535 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized
Sep  4 18:47:56.749624 kernel: intel_rapl_common: Found RAPL domain dram
Sep  4 18:47:56.813287 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
Sep  4 18:47:56.832148 kernel: ipmi_ssif: IPMI SSIF Interface driver
Sep  4 18:47:56.836879 systemd[1]: Finished systemd-udev-settle.service - Wait for udev To Complete Device Initialization.
Sep  4 18:47:56.853534 systemd[1]: Finished ensure-sysext.service.
Sep  4 18:47:56.871964 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen).
Sep  4 18:47:56.883270 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules...
Sep  4 18:47:56.894358 systemd[1]: Starting clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs...
Sep  4 18:47:56.900856 augenrules[1366]: No rules
Sep  4 18:47:56.906285 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met.
Sep  4 18:47:56.906876 systemd[1]: Starting lvm2-activation-early.service - Activation of LVM2 logical volumes...
Sep  4 18:47:56.918731 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Sep  4 18:47:56.926522 lvm[1371]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Sep  4 18:47:56.928772 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm...
Sep  4 18:47:56.938828 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore...
Sep  4 18:47:56.949767 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Sep  4 18:47:56.959262 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met.
Sep  4 18:47:56.959804 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM...
Sep  4 18:47:56.970768 systemd[1]: Starting systemd-journal-catalog-update.service - Rebuild Journal Catalog...
Sep  4 18:47:56.982048 systemd[1]: Starting systemd-networkd.service - Network Configuration...
Sep  4 18:47:56.982992 systemd[1]: Starting systemd-resolved.service - Network Name Resolution...
Sep  4 18:47:56.983811 systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization...
Sep  4 18:47:57.008258 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP...
Sep  4 18:47:57.019756 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup...
Sep  4 18:47:57.029174 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen).
Sep  4 18:47:57.029664 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules.
Sep  4 18:47:57.039332 systemd[1]: Finished clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs.
Sep  4 18:47:57.039477 systemd[1]: Finished lvm2-activation-early.service - Activation of LVM2 logical volumes.
Sep  4 18:47:57.039623 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Sep  4 18:47:57.039694 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Sep  4 18:47:57.039828 systemd[1]: modprobe@drm.service: Deactivated successfully.
Sep  4 18:47:57.039890 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm.
Sep  4 18:47:57.040020 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Sep  4 18:47:57.040081 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore.
Sep  4 18:47:57.040220 systemd[1]: modprobe@loop.service: Deactivated successfully.
Sep  4 18:47:57.040284 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Sep  4 18:47:57.040416 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM.
Sep  4 18:47:57.040555 systemd[1]: Finished systemd-journal-catalog-update.service - Rebuild Journal Catalog.
Sep  4 18:47:57.044747 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Sep  4 18:47:57.045426 systemd[1]: Starting lvm2-activation.service - Activation of LVM2 logical volumes...
Sep  4 18:47:57.045455 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Sep  4 18:47:57.045485 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met.
Sep  4 18:47:57.046061 systemd[1]: Starting systemd-update-done.service - Update is Completed...
Sep  4 18:47:57.046843 systemd[1]: Starting systemd-userdbd.service - User Database Manager...
Sep  4 18:47:57.046867 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Sep  4 18:47:57.047061 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP.
Sep  4 18:47:57.050188 lvm[1395]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Sep  4 18:47:57.053521 systemd[1]: Finished systemd-update-done.service - Update is Completed.
Sep  4 18:47:57.067672 systemd[1]: Started systemd-userdbd.service - User Database Manager.
Sep  4 18:47:57.087129 systemd[1]: Finished lvm2-activation.service - Activation of LVM2 logical volumes.
Sep  4 18:47:57.106729 systemd-resolved[1380]: Positive Trust Anchors:
Sep  4 18:47:57.106735 systemd-resolved[1380]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Sep  4 18:47:57.106760 systemd-resolved[1380]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 170.0.0.192.in-addr.arpa 171.0.0.192.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa ipv4only.arpa corp home internal intranet lan local private test
Sep  4 18:47:57.109393 systemd-resolved[1380]: Using system hostname 'ci-3975.2.1-a-995ac3be18'.
Sep  4 18:47:57.115508 systemd-networkd[1379]: lo: Link UP
Sep  4 18:47:57.115511 systemd-networkd[1379]: lo: Gained carrier
Sep  4 18:47:57.118093 systemd-networkd[1379]: bond0: netdev ready
Sep  4 18:47:57.118505 systemd-networkd[1379]: Enumeration completed
Sep  4 18:47:57.126316 systemd-networkd[1379]: enp1s0f0np0: Configuring with /etc/systemd/network/10-b8:59:9f:e1:63:ea.network.
Sep  4 18:47:57.181326 systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization.
Sep  4 18:47:57.192402 systemd[1]: Started systemd-resolved.service - Network Name Resolution.
Sep  4 18:47:57.202206 systemd[1]: Started systemd-networkd.service - Network Configuration.
Sep  4 18:47:57.211299 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup.
Sep  4 18:47:57.223127 systemd[1]: Reached target network.target - Network.
Sep  4 18:47:57.231175 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups.
Sep  4 18:47:57.242181 systemd[1]: Reached target sysinit.target - System Initialization.
Sep  4 18:47:57.251224 systemd[1]: Started motdgen.path - Watch for update engine configuration changes.
Sep  4 18:47:57.262189 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path - Watch for a cloud-config at /var/lib/flatcar-install/user_data.
Sep  4 18:47:57.273176 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories.
Sep  4 18:47:57.284170 systemd[1]: update-engine-stub.timer - Update Engine Stub Timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Sep  4 18:47:57.284184 systemd[1]: Reached target paths.target - Path Units.
Sep  4 18:47:57.292169 systemd[1]: Reached target time-set.target - System Time Set.
Sep  4 18:47:57.301248 systemd[1]: Started logrotate.timer - Daily rotation of log files.
Sep  4 18:47:57.310220 systemd[1]: Started mdadm.timer - Weekly check for MD array's redundancy information..
Sep  4 18:47:57.321169 systemd[1]: Reached target timers.target - Timer Units.
Sep  4 18:47:57.329568 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket.
Sep  4 18:47:57.339817 systemd[1]: Starting docker.socket - Docker Socket for the API...
Sep  4 18:47:57.350009 systemd[1]: Listening on sshd.socket - OpenSSH Server Socket.
Sep  4 18:47:57.359847 systemd[1]: Starting systemd-networkd-wait-online.service - Wait for Network to be Configured...
Sep  4 18:47:57.371482 systemd[1]: Listening on docker.socket - Docker Socket for the API.
Sep  4 18:47:57.381275 systemd[1]: Reached target sockets.target - Socket Units.
Sep  4 18:47:57.391212 systemd[1]: Reached target basic.target - Basic System.
Sep  4 18:47:57.399192 systemd[1]: addon-config@oem.service - Configure Addon /oem was skipped because no trigger condition checks were met.
Sep  4 18:47:57.399206 systemd[1]: addon-run@oem.service - Run Addon /oem was skipped because no trigger condition checks were met.
Sep  4 18:47:57.409233 systemd[1]: Starting containerd.service - containerd container runtime...
Sep  4 18:47:57.419789 systemd[1]: Starting coreos-metadata.service - Flatcar Metadata Agent...
Sep  4 18:47:57.429689 systemd[1]: Starting dbus.service - D-Bus System Message Bus...
Sep  4 18:47:57.438800 systemd[1]: Starting enable-oem-cloudinit.service - Enable cloudinit...
Sep  4 18:47:57.448881 systemd[1]: Starting extend-filesystems.service - Extend Filesystems...
Sep  4 18:47:57.451013 jq[1423]: false
Sep  4 18:47:57.458236 systemd[1]: flatcar-setup-environment.service - Modifies /etc/environment for CoreOS was skipped because of an unmet condition check (ConditionPathExists=/oem/bin/flatcar-setup-environment).
Sep  4 18:47:57.459135 systemd[1]: Starting motdgen.service - Generate /run/flatcar/motd...
Sep  4 18:47:57.459399 dbus-daemon[1422]: [system] SELinux support is enabled
Sep  4 18:47:57.461336 coreos-metadata[1421]: Sep 04 18:47:57.461 INFO Fetching https://metadata.packet.net/metadata: Attempt #1
Sep  4 18:47:57.462150 coreos-metadata[1421]: Sep 04 18:47:57.462 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution
Sep  4 18:47:57.466610 extend-filesystems[1426]: Found loop3
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found loop4
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found loop5
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found sda
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found sda1
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found sda2
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found sda3
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found usr
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found sda4
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found sda6
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found sda7
Sep  4 18:47:57.481746 extend-filesystems[1426]: Found sda9
Sep  4 18:47:57.481746 extend-filesystems[1426]: Checking size of /dev/sda9
Sep  4 18:47:57.481746 extend-filesystems[1426]: Resized partition /dev/sda9
Sep  4 18:47:57.623253 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks
Sep  4 18:47:57.623272 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (1251)
Sep  4 18:47:57.468837 systemd[1]: Starting ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline...
Sep  4 18:47:57.623353 extend-filesystems[1437]: resize2fs 1.47.0 (5-Feb-2023)
Sep  4 18:47:57.529288 systemd[1]: Starting sshd-keygen.service - Generate sshd host keys...
Sep  4 18:47:57.549745 systemd[1]: Starting systemd-logind.service - User Login Management...
Sep  4 18:47:57.574197 systemd[1]: Starting tcsd.service - TCG Core Services Daemon...
Sep  4 18:47:57.640518 sshd_keygen[1449]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Sep  4 18:47:57.590479 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Sep  4 18:47:57.640636 update_engine[1451]: I0904 18:47:57.630806  1451 main.cc:92] Flatcar Update Engine starting
Sep  4 18:47:57.640636 update_engine[1451]: I0904 18:47:57.631538  1451 update_check_scheduler.cc:74] Next update check in 6m45s
Sep  4 18:47:57.590835 systemd[1]: Starting update-engine.service - Update Engine...
Sep  4 18:47:57.605610 systemd-logind[1446]: Watching system buttons on /dev/input/event3 (Power Button)
Sep  4 18:47:57.605622 systemd-logind[1446]: Watching system buttons on /dev/input/event2 (Sleep Button)
Sep  4 18:47:57.605631 systemd-logind[1446]: Watching system buttons on /dev/input/event0 (HID 0557:2419)
Sep  4 18:47:57.605890 systemd-logind[1446]: New seat seat0.
Sep  4 18:47:57.608832 systemd[1]: Starting update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition...
Sep  4 18:47:57.640459 systemd[1]: Started dbus.service - D-Bus System Message Bus.
Sep  4 18:47:57.659339 systemd[1]: Started systemd-logind.service - User Login Management.
Sep  4 18:47:57.660804 jq[1452]: true
Sep  4 18:47:57.677305 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Sep  4 18:47:57.677396 systemd[1]: Condition check resulted in enable-oem-cloudinit.service - Enable cloudinit being skipped.
Sep  4 18:47:57.677578 systemd[1]: motdgen.service: Deactivated successfully.
Sep  4 18:47:57.677673 systemd[1]: Finished motdgen.service - Generate /run/flatcar/motd.
Sep  4 18:47:57.687311 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Sep  4 18:47:57.687391 systemd[1]: Finished ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline.
Sep  4 18:47:57.698337 systemd[1]: Finished sshd-keygen.service - Generate sshd host keys.
Sep  4 18:47:57.720027 jq[1461]: false
Sep  4 18:47:57.720452 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'.
Sep  4 18:47:57.720550 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition being skipped.
Sep  4 18:47:57.720991 (ntainerd)[1462]: containerd.service: Referenced but unset environment variable evaluates to an empty string: TORCX_IMAGEDIR, TORCX_UNPACKDIR
Sep  4 18:47:57.723849 dbus-daemon[1422]: [system] Successfully activated service 'org.freedesktop.systemd1'
Sep  4 18:47:57.732646 systemd[1]: tcsd.service: Skipped due to 'exec-condition'.
Sep  4 18:47:57.732744 systemd[1]: Condition check resulted in tcsd.service - TCG Core Services Daemon being skipped.
Sep  4 18:47:57.733118 systemd[1]: Started update-engine.service - Update Engine.
Sep  4 18:47:57.744202 systemd[1]: Starting issuegen.service - Generate /run/issue...
Sep  4 18:47:57.753058 systemd[1]: Starting sshkeys.service...
Sep  4 18:47:57.760237 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service - Load cloud-config from /usr/share/oem/cloud-config.yml was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Sep  4 18:47:57.760387 systemd[1]: Reached target system-config.target - Load system-provided cloud configs.
Sep  4 18:47:57.772260 systemd[1]: user-cloudinit-proc-cmdline.service - Load cloud-config from url defined in /proc/cmdline was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Sep  4 18:47:57.772395 systemd[1]: Reached target user-config.target - Load user-provided cloud configs.
Sep  4 18:47:57.790357 systemd[1]: Started locksmithd.service - Cluster reboot manager.
Sep  4 18:47:57.804837 systemd[1]: issuegen.service: Deactivated successfully.
Sep  4 18:47:57.804990 systemd[1]: Finished issuegen.service - Generate /run/issue.
Sep  4 18:47:57.812468 locksmithd[1482]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Sep  4 18:47:57.830366 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions...
Sep  4 18:47:57.840566 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions.
Sep  4 18:47:57.853661 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice - Slice /system/coreos-metadata-sshkeys.
Sep  4 18:47:57.877442 systemd[1]: Starting coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys)...
Sep  4 18:47:57.885370 containerd[1462]: time="2024-09-04T18:47:57.885305534Z" level=info msg="starting containerd" revision=1fbfc07f8d28210e62bdbcbf7b950bac8028afbf version=v1.7.17
Sep  4 18:47:57.888643 coreos-metadata[1498]: Sep 04 18:47:57.888 INFO Fetching https://metadata.packet.net/metadata: Attempt #1
Sep  4 18:47:57.888996 systemd[1]: Started getty@tty1.service - Getty on tty1.
Sep  4 18:47:57.889657 coreos-metadata[1498]: Sep 04 18:47:57.889 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution
Sep  4 18:47:57.899128 containerd[1462]: time="2024-09-04T18:47:57.899064249Z" level=info msg="loading plugin \"io.containerd.warning.v1.deprecations\"..." type=io.containerd.warning.v1
Sep  4 18:47:57.899128 containerd[1462]: time="2024-09-04T18:47:57.899107579Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Sep  4 18:47:57.899912 containerd[1462]: time="2024-09-04T18:47:57.899866059Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.6.48-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Sep  4 18:47:57.899912 containerd[1462]: time="2024-09-04T18:47:57.899883424Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900041 containerd[1462]: time="2024-09-04T18:47:57.900006628Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900041 containerd[1462]: time="2024-09-04T18:47:57.900017092Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Sep  4 18:47:57.900081 containerd[1462]: time="2024-09-04T18:47:57.900062310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900101 containerd[1462]: time="2024-09-04T18:47:57.900092827Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." error="no scratch file generator: skip plugin" type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900118 containerd[1462]: time="2024-09-04T18:47:57.900101516Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900214 containerd[1462]: time="2024-09-04T18:47:57.900144124Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900352 containerd[1462]: time="2024-09-04T18:47:57.900315202Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900352 containerd[1462]: time="2024-09-04T18:47:57.900325802Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Sep  4 18:47:57.900352 containerd[1462]: time="2024-09-04T18:47:57.900331660Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900417 containerd[1462]: time="2024-09-04T18:47:57.900381057Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Sep  4 18:47:57.900417 containerd[1462]: time="2024-09-04T18:47:57.900389733Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Sep  4 18:47:57.900448 containerd[1462]: time="2024-09-04T18:47:57.900417273Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Sep  4 18:47:57.900448 containerd[1462]: time="2024-09-04T18:47:57.900425237Z" level=info msg="metadata content store policy set" policy=shared
Sep  4 18:47:57.913647 systemd[1]: Started serial-getty@ttyS1.service - Serial Getty on ttyS1.
Sep  4 18:47:57.914202 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up
Sep  4 18:47:57.917441 containerd[1462]: time="2024-09-04T18:47:57.917394667Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Sep  4 18:47:57.917441 containerd[1462]: time="2024-09-04T18:47:57.917409454Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Sep  4 18:47:57.917441 containerd[1462]: time="2024-09-04T18:47:57.917417092Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Sep  4 18:47:57.917441 containerd[1462]: time="2024-09-04T18:47:57.917435402Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1
Sep  4 18:47:57.917514 containerd[1462]: time="2024-09-04T18:47:57.917446557Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1
Sep  4 18:47:57.917514 containerd[1462]: time="2024-09-04T18:47:57.917454851Z" level=info msg="NRI interface is disabled by configuration."
Sep  4 18:47:57.917514 containerd[1462]: time="2024-09-04T18:47:57.917461754Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Sep  4 18:47:57.917553 containerd[1462]: time="2024-09-04T18:47:57.917522864Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2
Sep  4 18:47:57.917553 containerd[1462]: time="2024-09-04T18:47:57.917533076Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1
Sep  4 18:47:57.917553 containerd[1462]: time="2024-09-04T18:47:57.917540520Z" level=info msg="loading plugin \"io.containerd.sandbox.controller.v1.local\"..." type=io.containerd.sandbox.controller.v1
Sep  4 18:47:57.917553 containerd[1462]: time="2024-09-04T18:47:57.917547917Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1
Sep  4 18:47:57.917605 containerd[1462]: time="2024-09-04T18:47:57.917556944Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Sep  4 18:47:57.917605 containerd[1462]: time="2024-09-04T18:47:57.917566897Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Sep  4 18:47:57.917605 containerd[1462]: time="2024-09-04T18:47:57.917574567Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Sep  4 18:47:57.917605 containerd[1462]: time="2024-09-04T18:47:57.917581325Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Sep  4 18:47:57.917605 containerd[1462]: time="2024-09-04T18:47:57.917588806Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Sep  4 18:47:57.917605 containerd[1462]: time="2024-09-04T18:47:57.917596633Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Sep  4 18:47:57.917605 containerd[1462]: time="2024-09-04T18:47:57.917603023Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Sep  4 18:47:57.917693 containerd[1462]: time="2024-09-04T18:47:57.917609226Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Sep  4 18:47:57.917693 containerd[1462]: time="2024-09-04T18:47:57.917664318Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Sep  4 18:47:57.917825 containerd[1462]: time="2024-09-04T18:47:57.917786478Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Sep  4 18:47:57.917825 containerd[1462]: time="2024-09-04T18:47:57.917801188Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.917825 containerd[1462]: time="2024-09-04T18:47:57.917808889Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1
Sep  4 18:47:57.917825 containerd[1462]: time="2024-09-04T18:47:57.917821900Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Sep  4 18:47:57.917900 containerd[1462]: time="2024-09-04T18:47:57.917851312Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.917900 containerd[1462]: time="2024-09-04T18:47:57.917859393Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.917900 containerd[1462]: time="2024-09-04T18:47:57.917866022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.917900 containerd[1462]: time="2024-09-04T18:47:57.917872102Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.917900 containerd[1462]: time="2024-09-04T18:47:57.917878880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.917900 containerd[1462]: time="2024-09-04T18:47:57.917885829Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.917900 containerd[1462]: time="2024-09-04T18:47:57.917892197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.917900 containerd[1462]: time="2024-09-04T18:47:57.917898195Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918012 containerd[1462]: time="2024-09-04T18:47:57.917905210Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Sep  4 18:47:57.918012 containerd[1462]: time="2024-09-04T18:47:57.917969885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918012 containerd[1462]: time="2024-09-04T18:47:57.917979379Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918012 containerd[1462]: time="2024-09-04T18:47:57.917985733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918012 containerd[1462]: time="2024-09-04T18:47:57.917992320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918012 containerd[1462]: time="2024-09-04T18:47:57.918005159Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918091 containerd[1462]: time="2024-09-04T18:47:57.918013228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918091 containerd[1462]: time="2024-09-04T18:47:57.918020728Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918091 containerd[1462]: time="2024-09-04T18:47:57.918026859Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Sep  4 18:47:57.918250 containerd[1462]: time="2024-09-04T18:47:57.918193346Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s ImagePullWithSyncFs:false IgnoreDeprecationWarnings:[]} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Sep  4 18:47:57.918250 containerd[1462]: time="2024-09-04T18:47:57.918227913Z" level=info msg="Connect containerd service"
Sep  4 18:47:57.918250 containerd[1462]: time="2024-09-04T18:47:57.918242261Z" level=info msg="using legacy CRI server"
Sep  4 18:47:57.918250 containerd[1462]: time="2024-09-04T18:47:57.918246248Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this"
Sep  4 18:47:57.918374 containerd[1462]: time="2024-09-04T18:47:57.918302792Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Sep  4 18:47:57.918667 containerd[1462]: time="2024-09-04T18:47:57.918611898Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Sep  4 18:47:57.918667 containerd[1462]: time="2024-09-04T18:47:57.918632139Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Sep  4 18:47:57.918667 containerd[1462]: time="2024-09-04T18:47:57.918642162Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="skip plugin: tracing endpoint not configured" type=io.containerd.tracing.processor.v1
Sep  4 18:47:57.918667 containerd[1462]: time="2024-09-04T18:47:57.918648556Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Sep  4 18:47:57.918667 containerd[1462]: time="2024-09-04T18:47:57.918655417Z" level=info msg="skip loading plugin \"io.containerd.internal.v1.tracing\"..." error="skip plugin: tracing endpoint not configured" type=io.containerd.internal.v1
Sep  4 18:47:57.918808 containerd[1462]: time="2024-09-04T18:47:57.918737870Z" level=info msg="Start subscribing containerd event"
Sep  4 18:47:57.918808 containerd[1462]: time="2024-09-04T18:47:57.918774585Z" level=info msg="Start recovering state"
Sep  4 18:47:57.918808 containerd[1462]: time="2024-09-04T18:47:57.918794709Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Sep  4 18:47:57.918808 containerd[1462]: time="2024-09-04T18:47:57.918808852Z" level=info msg="Start event monitor"
Sep  4 18:47:57.918880 containerd[1462]: time="2024-09-04T18:47:57.918815493Z" level=info msg="Start snapshots syncer"
Sep  4 18:47:57.918880 containerd[1462]: time="2024-09-04T18:47:57.918817961Z" level=info msg=serving... address=/run/containerd/containerd.sock
Sep  4 18:47:57.918880 containerd[1462]: time="2024-09-04T18:47:57.918821693Z" level=info msg="Start cni network conf syncer for default"
Sep  4 18:47:57.918880 containerd[1462]: time="2024-09-04T18:47:57.918844055Z" level=info msg="Start streaming server"
Sep  4 18:47:57.918932 containerd[1462]: time="2024-09-04T18:47:57.918883383Z" level=info msg="containerd successfully booted in 0.034018s"
Sep  4 18:47:57.931467 systemd[1]: Reached target getty.target - Login Prompts.
Sep  4 18:47:57.937146 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link
Sep  4 18:47:57.939034 systemd-networkd[1379]: enp1s0f1np1: Configuring with /etc/systemd/network/10-b8:59:9f:e1:63:eb.network.
Sep  4 18:47:57.946693 systemd[1]: Started containerd.service - containerd container runtime.
Sep  4 18:47:58.001175 kernel: EXT4-fs (sda9): resized filesystem to 116605649
Sep  4 18:47:58.025008 extend-filesystems[1437]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required
Sep  4 18:47:58.025008 extend-filesystems[1437]: old_desc_blocks = 1, new_desc_blocks = 56
Sep  4 18:47:58.025008 extend-filesystems[1437]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long.
Sep  4 18:47:58.068208 extend-filesystems[1426]: Resized filesystem in /dev/sda9
Sep  4 18:47:58.068208 extend-filesystems[1426]: Found sdb
Sep  4 18:47:58.025849 systemd[1]: extend-filesystems.service: Deactivated successfully.
Sep  4 18:47:58.025961 systemd[1]: Finished extend-filesystems.service - Extend Filesystems.
Sep  4 18:47:58.221240 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up
Sep  4 18:47:58.245153 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link
Sep  4 18:47:58.245296 systemd-networkd[1379]: bond0: Configuring with /etc/systemd/network/05-bond0.network.
Sep  4 18:47:58.248456 systemd-networkd[1379]: enp1s0f0np0: Link UP
Sep  4 18:47:58.250978 systemd-networkd[1379]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:59:9f:e1:63:ea.network.
Sep  4 18:47:58.251321 systemd-networkd[1379]: enp1s0f1np1: Link UP
Sep  4 18:47:58.251648 systemd-networkd[1379]: enp1s0f0np0: Gained carrier
Sep  4 18:47:58.268188 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond
Sep  4 18:47:58.278479 systemd-networkd[1379]: enp1s0f1np1: Gained carrier
Sep  4 18:47:58.290567 systemd-networkd[1379]: bond0: Link UP
Sep  4 18:47:58.291193 systemd-networkd[1379]: bond0: Gained carrier
Sep  4 18:47:58.291532 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:47:58.292310 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:47:58.292950 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:47:58.293246 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:47:58.376049 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex
Sep  4 18:47:58.376069 kernel: bond0: active interface up!
Sep  4 18:47:58.462238 coreos-metadata[1421]: Sep 04 18:47:58.462 INFO Fetching https://metadata.packet.net/metadata: Attempt #2
Sep  4 18:47:58.516183 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex
Sep  4 18:47:58.889692 coreos-metadata[1498]: Sep 04 18:47:58.889 INFO Fetching https://metadata.packet.net/metadata: Attempt #2
Sep  4 18:47:59.662330 systemd-networkd[1379]: bond0: Gained IPv6LL
Sep  4 18:47:59.662512 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:48:00.302596 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:48:00.302659 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:48:00.303573 systemd[1]: Finished systemd-networkd-wait-online.service - Wait for Network to be Configured.
Sep  4 18:48:00.315971 systemd[1]: Reached target network-online.target - Network is Online.
Sep  4 18:48:00.333408 systemd[1]: Starting nvidia.service - NVIDIA Configure Service...
Sep  4 18:48:00.343738 systemd[1]: Finished nvidia.service - NVIDIA Configure Service.
Sep  4 18:48:02.139197 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2
Sep  4 18:48:02.139352 kernel: mlx5_core 0000:01:00.0: shared_fdb:0 mode:queue_affinity
Sep  4 18:48:02.578806 coreos-metadata[1421]: Sep 04 18:48:02.578 INFO Fetch successful
Sep  4 18:48:02.633771 systemd[1]: Finished coreos-metadata.service - Flatcar Metadata Agent.
Sep  4 18:48:02.662393 systemd[1]: Starting etcd-member.service - etcd (System Application Container)...
Sep  4 18:48:02.662703 (-wrapper)[1529]: etcd-member.service: Referenced but unset environment variable evaluates to an empty string: ETCD_OPTS
Sep  4 18:48:02.673241 systemd[1]: Starting packet-phone-home.service - Report Success to Packet...
Sep  4 18:48:02.764335 systemd[1]: Starting docker.service - Docker Application Container Engine...
Sep  4 18:48:02.764361 (dockerd)[1542]: docker.service: Referenced but unset environment variable evaluates to an empty string: DOCKER_CGROUPS, DOCKER_OPTS, DOCKER_OPT_BIP, DOCKER_OPT_IPMASQ, DOCKER_OPT_MTU
Sep  4 18:48:02.975796 coreos-metadata[1498]: Sep 04 18:48:02.975 INFO Fetch successful
Sep  4 18:48:02.980856 login[1506]: pam_lastlog(login:session): file /var/log/lastlog is locked/write
Sep  4 18:48:02.981135 dockerd[1542]: time="2024-09-04T18:48:02.981055968Z" level=info msg="Starting up"
Sep  4 18:48:02.982814 login[1509]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Sep  4 18:48:02.988096 systemd-logind[1446]: New session 1 of user core.
Sep  4 18:48:02.989921 systemd[1]: Created slice user-500.slice - User Slice of UID 500.
Sep  4 18:48:03.002343 systemd[1]: Starting user-runtime-dir@500.service - User Runtime Directory /run/user/500...
Sep  4 18:48:03.003577 dockerd[1542]: time="2024-09-04T18:48:03.003526167Z" level=info msg="Loading containers: start."
Sep  4 18:48:03.005525 unknown[1498]: wrote ssh authorized keys file for user: core
Sep  4 18:48:03.009247 systemd[1]: Finished user-runtime-dir@500.service - User Runtime Directory /run/user/500.
Sep  4 18:48:03.010879 systemd[1]: Starting user@500.service - User Manager for UID 500...
Sep  4 18:48:03.015551 (systemd)[1573]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:03.016931 systemd[1]: Finished packet-phone-home.service - Report Success to Packet.
Sep  4 18:48:03.023309 update-ssh-keys[1570]: Updated "/home/core/.ssh/authorized_keys"
Sep  4 18:48:03.023996 systemd[1]: Finished coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys).
Sep  4 18:48:03.025026 systemd[1]: Finished sshkeys.service.
Sep  4 18:48:03.074211 kernel: Initializing XFRM netlink socket
Sep  4 18:48:03.090938 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:48:03.091002 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:48:03.093784 systemd[1573]: Queued start job for default target default.target.
Sep  4 18:48:03.094281 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:48:03.107415 systemd[1573]: Created slice app.slice - User Application Slice.
Sep  4 18:48:03.107430 systemd[1573]: Reached target paths.target - Paths.
Sep  4 18:48:03.107440 systemd[1573]: Reached target timers.target - Timers.
Sep  4 18:48:03.108037 systemd[1573]: Starting dbus.socket - D-Bus User Message Bus Socket...
Sep  4 18:48:03.114022 systemd[1573]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Sep  4 18:48:03.114054 systemd[1573]: Reached target sockets.target - Sockets.
Sep  4 18:48:03.114063 systemd[1573]: Reached target basic.target - Basic System.
Sep  4 18:48:03.114084 systemd[1573]: Reached target default.target - Main User Target.
Sep  4 18:48:03.114102 systemd[1573]: Startup finished in 95ms.
Sep  4 18:48:03.114280 systemd[1]: Started user@500.service - User Manager for UID 500.
Sep  4 18:48:03.115014 systemd[1]: Started session-1.scope - Session 1 of User core.
Sep  4 18:48:03.127346 systemd-networkd[1379]: docker0: Link UP
Sep  4 18:48:03.127542 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:48:03.142959 dockerd[1542]: time="2024-09-04T18:48:03.142914803Z" level=info msg="Loading containers: done."
Sep  4 18:48:03.202713 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2043647291-merged.mount: Deactivated successfully.
Sep  4 18:48:03.203366 dockerd[1542]: time="2024-09-04T18:48:03.203320254Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Sep  4 18:48:03.203465 dockerd[1542]: time="2024-09-04T18:48:03.203427471Z" level=info msg="Docker daemon" commit=fca702de7f71362c8d103073c7e4a1d0a467fadd graphdriver=overlay2 version=24.0.9
Sep  4 18:48:03.203496 dockerd[1542]: time="2024-09-04T18:48:03.203478858Z" level=info msg="Daemon has completed initialization"
Sep  4 18:48:03.214462 dockerd[1542]: time="2024-09-04T18:48:03.214411801Z" level=info msg="API listen on /run/docker.sock"
Sep  4 18:48:03.214516 systemd[1]: Started docker.service - Docker Application Container Engine.
Sep  4 18:48:03.214968 etcd-wrapper[1533]: Error response from daemon: No such container: etcd-member
Sep  4 18:48:03.222234 etcd-wrapper[1692]: Error response from daemon: No such container: etcd-member
Sep  4 18:48:03.238627 etcd-wrapper[1713]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally
Sep  4 18:48:03.981959 login[1506]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Sep  4 18:48:03.993337 systemd-logind[1446]: New session 2 of user core.
Sep  4 18:48:04.004561 systemd[1]: Started session-2.scope - Session 2 of User core.
Sep  4 18:48:04.639586 etcd-wrapper[1713]: v3.5.0: Pulling from coreos/etcd
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 1813d21adc01: Pulling fs layer
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 6e96907ab677: Pulling fs layer
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 444ed0ea8673: Pulling fs layer
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 0fd2df5633f0: Pulling fs layer
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 8cc22b9456bb: Pulling fs layer
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 7ac70aecd290: Pulling fs layer
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 4b376c64dfe4: Pulling fs layer
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 0fd2df5633f0: Waiting
Sep  4 18:48:05.082010 etcd-wrapper[1713]: 4b376c64dfe4: Waiting
Sep  4 18:48:05.082300 etcd-wrapper[1713]: 8cc22b9456bb: Waiting
Sep  4 18:48:05.082300 etcd-wrapper[1713]: 7ac70aecd290: Waiting
Sep  4 18:48:05.473278 etcd-wrapper[1713]: 444ed0ea8673: Verifying Checksum
Sep  4 18:48:05.473278 etcd-wrapper[1713]: 444ed0ea8673: Download complete
Sep  4 18:48:05.488387 etcd-wrapper[1713]: 6e96907ab677: Download complete
Sep  4 18:48:05.560058 etcd-wrapper[1713]: 1813d21adc01: Verifying Checksum
Sep  4 18:48:05.560058 etcd-wrapper[1713]: 1813d21adc01: Download complete
Sep  4 18:48:05.795238 etcd-wrapper[1713]: 8cc22b9456bb: Verifying Checksum
Sep  4 18:48:05.795238 etcd-wrapper[1713]: 8cc22b9456bb: Download complete
Sep  4 18:48:05.860393 etcd-wrapper[1713]: 7ac70aecd290: Verifying Checksum
Sep  4 18:48:05.860393 etcd-wrapper[1713]: 7ac70aecd290: Download complete
Sep  4 18:48:05.868812 etcd-wrapper[1713]: 0fd2df5633f0: Verifying Checksum
Sep  4 18:48:05.868812 etcd-wrapper[1713]: 0fd2df5633f0: Download complete
Sep  4 18:48:05.934105 etcd-wrapper[1713]: 1813d21adc01: Pull complete
Sep  4 18:48:06.011998 systemd[1]: var-lib-docker-overlay2-21a40d5de16912e103857e173dc909140390013004cd2a3b4356aa3b2a40a0a8-merged.mount: Deactivated successfully.
Sep  4 18:48:06.116672 etcd-wrapper[1713]: 4b376c64dfe4: Verifying Checksum
Sep  4 18:48:06.116672 etcd-wrapper[1713]: 4b376c64dfe4: Download complete
Sep  4 18:48:06.260145 etcd-wrapper[1713]: 6e96907ab677: Pull complete
Sep  4 18:48:06.324764 systemd[1]: Created slice system-sshd.slice - Slice /system/sshd.
Sep  4 18:48:06.325712 systemd[1]: Started sshd@0-147.75.203.91:22-139.178.89.65:34568.service - OpenSSH per-connection server daemon (139.178.89.65:34568).
Sep  4 18:48:06.341075 systemd[1]: var-lib-docker-overlay2-43436994770b504296c869923b2eef88d4f9560c089fd906648c3873cb2a6388-merged.mount: Deactivated successfully.
Sep  4 18:48:06.359523 sshd[1745]: Accepted publickey for core from 139.178.89.65 port 34568 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:06.362522 sshd[1745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:06.372857 systemd-logind[1446]: New session 3 of user core.
Sep  4 18:48:06.385430 etcd-wrapper[1713]: 444ed0ea8673: Pull complete
Sep  4 18:48:06.385272 systemd[1]: Started session-3.scope - Session 3 of User core.
Sep  4 18:48:06.445115 systemd[1]: Started sshd@1-147.75.203.91:22-139.178.89.65:34576.service - OpenSSH per-connection server daemon (139.178.89.65:34576).
Sep  4 18:48:06.471999 sshd[1754]: Accepted publickey for core from 139.178.89.65 port 34576 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:06.472665 sshd[1754]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:06.474824 systemd-logind[1446]: New session 4 of user core.
Sep  4 18:48:06.488294 systemd[1]: Started session-4.scope - Session 4 of User core.
Sep  4 18:48:06.490477 etcd-wrapper[1713]: 0fd2df5633f0: Pull complete
Sep  4 18:48:06.507145 kernel: overlayfs: lowerdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior.
Sep  4 18:48:06.511455 etcd-wrapper[1713]: 8cc22b9456bb: Pull complete
Sep  4 18:48:06.517167 etcd-wrapper[1713]: 7ac70aecd290: Pull complete
Sep  4 18:48:06.522971 etcd-wrapper[1713]: 4b376c64dfe4: Pull complete
Sep  4 18:48:06.525438 etcd-wrapper[1713]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b
Sep  4 18:48:06.526253 etcd-wrapper[1713]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0
Sep  4 18:48:06.534995 sshd[1754]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:06.552751 systemd[1]: sshd@1-147.75.203.91:22-139.178.89.65:34576.service: Deactivated successfully.
Sep  4 18:48:06.553518 systemd[1]: session-4.scope: Deactivated successfully.
Sep  4 18:48:06.553913 systemd-logind[1446]: Session 4 logged out. Waiting for processes to exit.
Sep  4 18:48:06.554724 systemd[1]: Started sshd@2-147.75.203.91:22-139.178.89.65:34582.service - OpenSSH per-connection server daemon (139.178.89.65:34582).
Sep  4 18:48:06.555104 systemd-logind[1446]: Removed session 4.
Sep  4 18:48:06.581836 sshd[1784]: Accepted publickey for core from 139.178.89.65 port 34582 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:06.582487 sshd[1784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:06.585022 systemd-logind[1446]: New session 5 of user core.
Sep  4 18:48:06.598264 systemd[1]: Started session-5.scope - Session 5 of User core.
Sep  4 18:48:06.619867 containerd[1462]: time="2024-09-04T18:48:06.619634341Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Sep  4 18:48:06.619867 containerd[1462]: time="2024-09-04T18:48:06.619843056Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:06.619867 containerd[1462]: time="2024-09-04T18:48:06.619853942Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Sep  4 18:48:06.619867 containerd[1462]: time="2024-09-04T18:48:06.619860990Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:06.643314 systemd[1]: Started docker-6a4857d6ac96c1f6f16f7d7b319bc95e6711acd819be47920b920e3dbdcdc79e.scope - libcontainer container 6a4857d6ac96c1f6f16f7d7b319bc95e6711acd819be47920b920e3dbdcdc79e.
Sep  4 18:48:06.645782 sshd[1784]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:06.647266 systemd[1]: sshd@2-147.75.203.91:22-139.178.89.65:34582.service: Deactivated successfully.
Sep  4 18:48:06.648231 systemd[1]: session-5.scope: Deactivated successfully.
Sep  4 18:48:06.648636 systemd-logind[1446]: Session 5 logged out. Waiting for processes to exit.
Sep  4 18:48:06.649176 systemd-logind[1446]: Removed session 5.
Sep  4 18:48:06.676992 etcd-wrapper[1713]: {"level":"info","ts":1725475686.676851,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"}
Sep  4 18:48:06.676992 etcd-wrapper[1713]: {"level":"info","ts":1725475686.6768913,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"46156ced210545c5a9b2eedd777b9f3f"}
Sep  4 18:48:06.676992 etcd-wrapper[1713]: {"level":"warn","ts":1725475686.6769102,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"}
Sep  4 18:48:06.676992 etcd-wrapper[1713]: {"level":"warn","ts":1725475686.6769147,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"}
Sep  4 18:48:06.676992 etcd-wrapper[1713]: {"level":"warn","ts":1725475686.676918,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"}
Sep  4 18:48:06.676992 etcd-wrapper[1713]: {"level":"warn","ts":1725475686.6769207,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"}
Sep  4 18:48:06.676992 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:06.676Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.51:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.51:2380","--advertise-client-urls=http://10.67.80.51:2379","--discovery=https://discovery.etcd.io/0dfefd10b1593f9b1d0d40a261903eb3","--enable-v2=true"]}
Sep  4 18:48:06.677240 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:06.677Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.51:2380"]}
Sep  4 18:48:06.677295 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:06.677Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]}
Sep  4 18:48:06.677295 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:06.677Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"46156ced210545c5a9b2eedd777b9f3f","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.51:2380"],"listen-peer-urls":["http://10.67.80.51:2380"],"advertise-client-urls":["http://10.67.80.51:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"46156ced210545c5a9b2eedd777b9f3f=http://10.67.80.51:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/0dfefd10b1593f9b1d0d40a261903eb3","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/0dfefd10b1593f9b1d0d40a261903eb3","discovery-proxy":"","downgrade-check-interval":"5s"}
Sep  4 18:48:06.678014 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:06.677Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"616.176µs"}
Sep  4 18:48:06.939707 systemd[1]: var-lib-docker-overlay2-5193d2c08c325e9dc079d7fc52a8396f8d5d942ca30c718c465b3cc2d4e1dc6a-merged.mount: Deactivated successfully.
Sep  4 18:48:07.220615 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:07.219Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"150a9745ca8d8653"}
Sep  4 18:48:07.220615 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:07.219Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"4269f11577e1bcfe"}
Sep  4 18:48:07.220615 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:07.219Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1}
Sep  4 18:48:16.662778 systemd[1]: Started sshd@3-147.75.203.91:22-139.178.89.65:38316.service - OpenSSH per-connection server daemon (139.178.89.65:38316).
Sep  4 18:48:16.690305 sshd[1844]: Accepted publickey for core from 139.178.89.65 port 38316 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:16.691031 sshd[1844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:16.693962 systemd-logind[1446]: New session 6 of user core.
Sep  4 18:48:16.694585 systemd[1]: Started session-6.scope - Session 6 of User core.
Sep  4 18:48:16.748306 sshd[1844]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:16.762819 systemd[1]: sshd@3-147.75.203.91:22-139.178.89.65:38316.service: Deactivated successfully.
Sep  4 18:48:16.763620 systemd[1]: session-6.scope: Deactivated successfully.
Sep  4 18:48:16.764438 systemd-logind[1446]: Session 6 logged out. Waiting for processes to exit.
Sep  4 18:48:16.765092 systemd[1]: Started sshd@4-147.75.203.91:22-139.178.89.65:38322.service - OpenSSH per-connection server daemon (139.178.89.65:38322).
Sep  4 18:48:16.765771 systemd-logind[1446]: Removed session 6.
Sep  4 18:48:16.795989 sshd[1851]: Accepted publickey for core from 139.178.89.65 port 38322 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:16.797012 sshd[1851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:16.800971 systemd-logind[1446]: New session 7 of user core.
Sep  4 18:48:16.810425 systemd[1]: Started session-7.scope - Session 7 of User core.
Sep  4 18:48:16.876955 sshd[1851]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:16.884662 systemd[1]: sshd@4-147.75.203.91:22-139.178.89.65:38322.service: Deactivated successfully.
Sep  4 18:48:16.887651 systemd[1]: session-7.scope: Deactivated successfully.
Sep  4 18:48:16.888002 systemd-logind[1446]: Session 7 logged out. Waiting for processes to exit.
Sep  4 18:48:16.888563 systemd-logind[1446]: Removed session 7.
Sep  4 18:48:20.826056 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.825Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"4a3893e07ab52c16"}
Sep  4 18:48:20.826056 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.825Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3}
Sep  4 18:48:20.829360 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.829Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"4269f11577e1bcfe","cluster-id":"709caa4f2aac1b80"}
Sep  4 18:48:20.829360 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.829Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=()"}
Sep  4 18:48:20.829360 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.829Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became follower at term 0"}
Sep  4 18:48:20.829360 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.829Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 4269f11577e1bcfe [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"}
Sep  4 18:48:20.829360 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.829Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became follower at term 1"}
Sep  4 18:48:20.829360 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.829Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411)"}
Sep  4 18:48:20.829360 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.829Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411 4785621153565752574)"}
Sep  4 18:48:20.829360 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.829Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411 4785621153565752574 5348187149843115030)"}
Sep  4 18:48:20.829775 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:20.829Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"}
Sep  4 18:48:20.830164 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.830Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1}
Sep  4 18:48:20.830515 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.830Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"}
Sep  4 18:48:20.830775 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.830Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.830775 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.830Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.831098 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.831510 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.831760 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.831760 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653","remote-peer-urls":["http://10.67.80.81:2380"]}
Sep  4 18:48:20.831760 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:20.831760 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:20.831898 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.831898 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.831964 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:20.832019 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.831Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:20.832287 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:20.832287 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16","remote-peer-urls":["http://10.67.80.59:2380"]}
Sep  4 18:48:20.832374 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"4269f11577e1bcfe","local-server-version":"3.5.0","cluster-version":"to_be_decided"}
Sep  4 18:48:20.832374 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10}
Sep  4 18:48:20.832426 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:20.832426 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:20.832684 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411 4785621153565752574 5348187149843115030)"}
Sep  4 18:48:20.832750 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","added-peer-id":"150a9745ca8d8653","added-peer-peer-urls":["http://10.67.80.81:2380"]}
Sep  4 18:48:20.832789 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411 4785621153565752574 5348187149843115030)"}
Sep  4 18:48:20.832903 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","added-peer-id":"4269f11577e1bcfe","added-peer-peer-urls":["http://10.67.80.51:2380"]}
Sep  4 18:48:20.832947 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411 4785621153565752574 5348187149843115030)"}
Sep  4 18:48:20.832973 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.832Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","added-peer-id":"4a3893e07ab52c16","added-peer-peer-urls":["http://10.67.80.59:2380"]}
Sep  4 18:48:20.833607 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:20.833Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."}
Sep  4 18:48:20.833697 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"4269f11577e1bcfe","initial-advertise-peer-urls":["http://10.67.80.51:2380"],"listen-peer-urls":["http://10.67.80.51:2380"],"advertise-client-urls":["http://10.67.80.51:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]}
Sep  4 18:48:20.833697 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.833697 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.51:2380"}
Sep  4 18:48:20.833697 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.833697 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.51:2380"}
Sep  4 18:48:20.833861 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.833861 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"4269f11577e1bcfe","to":"150a9745ca8d8653","stream-type":"stream MsgApp v2"}
Sep  4 18:48:20.833861 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:20.833861 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"4269f11577e1bcfe","to":"150a9745ca8d8653","stream-type":"stream Message"}
Sep  4 18:48:20.833861 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:20.833Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:21.024940 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.024Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"4269f11577e1bcfe","to":"4a3893e07ab52c16","stream-type":"stream Message"}
Sep  4 18:48:21.024940 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.024Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"4269f11577e1bcfe","to":"4a3893e07ab52c16","stream-type":"stream MsgApp v2"}
Sep  4 18:48:21.024940 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.024Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:21.024940 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.024Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:21.024940 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.024Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:21.025873 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.025Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:21.025873 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.025Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:21.034365 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.033Z","caller":"etcdserver/server.go:767","msg":"initialized peer connections; fast-forwarding election ticks","local-member-id":"4269f11577e1bcfe","forward-ticks":8,"forward-duration":"800ms","election-ticks":10,"election-timeout":"1s","active-remote-members":2}
Sep  4 18:48:21.135998 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.135Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 150a9745ca8d8653 [logterm: 1, index: 3] at term 1"}
Sep  4 18:48:21.137219 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.136Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [term: 1] received a MsgVote message with higher term from 150a9745ca8d8653 [term: 2]"}
Sep  4 18:48:21.137219 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.136Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became follower at term 2"}
Sep  4 18:48:21.137219 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.136Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 1, index: 3, vote: 0] cast MsgVote for 150a9745ca8d8653 [logterm: 1, index: 3] at term 2"}
Sep  4 18:48:21.137859 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.137Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 4269f11577e1bcfe elected leader 150a9745ca8d8653 at term 2"}
Sep  4 18:48:21.139097 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.138Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"4269f11577e1bcfe","local-member-attributes":"{Name:46156ced210545c5a9b2eedd777b9f3f ClientURLs:[http://10.67.80.51:2379]}","request-path":"/0/members/4269f11577e1bcfe/attributes","cluster-id":"709caa4f2aac1b80","publish-timeout":"7s"}
Sep  4 18:48:21.139097 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.139Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"}
Sep  4 18:48:21.139185 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.139Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"}
Sep  4 18:48:21.139185 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.139Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"}
Sep  4 18:48:21.139239 systemd[1]: Started etcd-member.service - etcd (System Application Container).
Sep  4 18:48:21.139683 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.139Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"}
Sep  4 18:48:21.140155 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.140Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","cluster-version":"3.5"}
Sep  4 18:48:21.140155 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:21.140Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"}
Sep  4 18:48:21.154452 systemd[1]: Starting flanneld.service - flannel - Network fabric for containers (System Application Container)...
Sep  4 18:48:21.209088 etcdctl[1864]: { "Network": "10.254.0.0/16", "Backend": {"Type": "udp"} }
Sep  4 18:48:21.227628 flannel-wrapper[1878]: Error response from daemon: No such container: flannel
Sep  4 18:48:21.235414 flannel-wrapper[1886]: Error response from daemon: No such container: flannel
Sep  4 18:48:21.244664 flannel-wrapper[1904]: Unable to find image 'quay.io/coreos/flannel:v0.14.0' locally
Sep  4 18:48:22.481790 flannel-wrapper[1904]: v0.14.0: Pulling from coreos/flannel
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 801bfaa63ef2: Pulling fs layer
Sep  4 18:48:22.809334 flannel-wrapper[1904]: e4264a7179f6: Pulling fs layer
Sep  4 18:48:22.809334 flannel-wrapper[1904]: bc75ea45ad2e: Pulling fs layer
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 78648579d12a: Pulling fs layer
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 3393447261e4: Pulling fs layer
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 071b96dd834b: Pulling fs layer
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 4de2f0468a91: Pulling fs layer
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 78648579d12a: Waiting
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 3393447261e4: Waiting
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 071b96dd834b: Waiting
Sep  4 18:48:22.809334 flannel-wrapper[1904]: 4de2f0468a91: Waiting
Sep  4 18:48:23.151487 flannel-wrapper[1904]: bc75ea45ad2e: Verifying Checksum
Sep  4 18:48:23.151487 flannel-wrapper[1904]: bc75ea45ad2e: Download complete
Sep  4 18:48:23.190539 flannel-wrapper[1904]: 801bfaa63ef2: Verifying Checksum
Sep  4 18:48:23.190758 flannel-wrapper[1904]: 801bfaa63ef2: Download complete
Sep  4 18:48:23.209841 flannel-wrapper[1904]: e4264a7179f6: Verifying Checksum
Sep  4 18:48:23.209841 flannel-wrapper[1904]: e4264a7179f6: Download complete
Sep  4 18:48:23.241101 flannel-wrapper[1904]: 801bfaa63ef2: Pull complete
Sep  4 18:48:23.344235 systemd[1]: var-lib-docker-overlay2-26799e84bbceaea0b2f885616577697a7e2c849bdf63d5d5c69ffa0e53b0a618-merged.mount: Deactivated successfully.
Sep  4 18:48:23.396932 flannel-wrapper[1904]: e4264a7179f6: Pull complete
Sep  4 18:48:23.417828 systemd[1]: var-lib-docker-overlay2-90a1952c5d5fff23434444359769849c2ac889f9c6b2eb34c7e67f913a40372a-merged.mount: Deactivated successfully.
Sep  4 18:48:23.426676 flannel-wrapper[1904]: bc75ea45ad2e: Pull complete
Sep  4 18:48:23.511909 flannel-wrapper[1904]: 3393447261e4: Download complete
Sep  4 18:48:23.528389 flannel-wrapper[1904]: 071b96dd834b: Verifying Checksum
Sep  4 18:48:23.528389 flannel-wrapper[1904]: 071b96dd834b: Download complete
Sep  4 18:48:23.677229 flannel-wrapper[1904]: 78648579d12a: Verifying Checksum
Sep  4 18:48:23.677229 flannel-wrapper[1904]: 78648579d12a: Download complete
Sep  4 18:48:23.830840 flannel-wrapper[1904]: 4de2f0468a91: Verifying Checksum
Sep  4 18:48:23.830840 flannel-wrapper[1904]: 4de2f0468a91: Download complete
Sep  4 18:48:23.970523 flannel-wrapper[1904]: 78648579d12a: Pull complete
Sep  4 18:48:23.978309 flannel-wrapper[1904]: 3393447261e4: Pull complete
Sep  4 18:48:23.985006 flannel-wrapper[1904]: 071b96dd834b: Pull complete
Sep  4 18:48:23.991703 flannel-wrapper[1904]: 4de2f0468a91: Pull complete
Sep  4 18:48:23.994302 flannel-wrapper[1904]: Digest: sha256:4a330b2f2e74046e493b2edc30d61fdebbdddaaedcb32d62736f25be8d3c64d5
Sep  4 18:48:23.995143 flannel-wrapper[1904]: Status: Downloaded newer image for quay.io/coreos/flannel:v0.14.0
Sep  4 18:48:24.019800 containerd[1462]: time="2024-09-04T18:48:24.019680355Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Sep  4 18:48:24.019800 containerd[1462]: time="2024-09-04T18:48:24.019740498Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:24.019800 containerd[1462]: time="2024-09-04T18:48:24.019748646Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Sep  4 18:48:24.019800 containerd[1462]: time="2024-09-04T18:48:24.019755967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:24.044459 systemd[1]: Started docker-844cf1283089c1e248d640c89bf56a7809cd8ce6aa3fa4113888a5da97a978ca.scope - libcontainer container 844cf1283089c1e248d640c89bf56a7809cd8ce6aa3fa4113888a5da97a978ca.
Sep  4 18:48:24.063538 flannel-wrapper[1904]: I0904 18:48:24.063330       1 main.go:520] Determining IP address of default interface
Sep  4 18:48:24.063627 flannel-wrapper[1904]: I0904 18:48:24.063540       1 main.go:533] Using interface with name bond0 and address 147.75.203.91
Sep  4 18:48:24.063627 flannel-wrapper[1904]: I0904 18:48:24.063548       1 main.go:550] Defaulting external address to interface address (147.75.203.91)
Sep  4 18:48:24.063627 flannel-wrapper[1904]: I0904 18:48:24.063592       1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: None
Sep  4 18:48:24.063627 flannel-wrapper[1904]: I0904 18:48:24.063597       1 main.go:257] Installing signal handlers
Sep  4 18:48:24.065287 flannel-wrapper[1904]: I0904 18:48:24.065136       1 main.go:392] Found network config - Backend type: udp
Sep  4 18:48:24.066844 flannel-wrapper[1904]: I0904 18:48:24.066737       1 local_manager.go:234] Picking subnet in range 10.254.1.0 ... 10.254.255.0
Sep  4 18:48:24.067466 flannel-wrapper[1904]: I0904 18:48:24.067374       1 local_manager.go:220] Allocated lease (10.254.71.0/24) to current node (147.75.203.91)
Sep  4 18:48:24.078187 kernel: tun: Universal TUN/TAP device driver, 1.6
Sep  4 18:48:24.078520 systemd-timesyncd[1381]: Network configuration changed, trying to establish connection.
Sep  4 18:48:24.078625 systemd-networkd[1379]: flannel0: Link UP
Sep  4 18:48:24.078629 systemd-networkd[1379]: flannel0: Gained carrier
Sep  4 18:48:24.078929 systemd-networkd[1379]: flannel0: Gained IPv6LL
Sep  4 18:48:24.078983 flannel-wrapper[1904]: I0904 18:48:24.078798       1 main.go:357] Current network or subnet (10.254.0.0/16, 10.254.71.0/24) is not equal to previous one (0.0.0.0/0, 0.0.0.0/0), trying to recycle old iptables rules
Sep  4 18:48:24.086882 flannel-wrapper[1904]: I0904 18:48:24.086752       1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN
Sep  4 18:48:24.087523 flannel-wrapper[1904]: I0904 18:48:24.087383       1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully
Sep  4 18:48:24.088024 flannel-wrapper[1904]: I0904 18:48:24.087925       1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN
Sep  4 18:48:24.088626 flannel-wrapper[1904]: I0904 18:48:24.088508       1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j MASQUERADE --random-fully
Sep  4 18:48:24.089093 flannel-wrapper[1904]: I0904 18:48:24.089057       1 main.go:307] Setting up masking rules
Sep  4 18:48:24.089544 flannel-wrapper[1904]: I0904 18:48:24.089406       1 main.go:315] Changing default FORWARD chain policy to ACCEPT
Sep  4 18:48:24.089544 flannel-wrapper[1904]: I0904 18:48:24.089444       1 main.go:323] Wrote subnet file to /run/flannel/subnet.env
Sep  4 18:48:24.089544 flannel-wrapper[1904]: I0904 18:48:24.089448       1 main.go:327] Running backend.
Sep  4 18:48:24.089611 flannel-wrapper[1904]: I0904 18:48:24.089514       1 udp_network_amd64.go:100] Watching for new subnet leases
Sep  4 18:48:24.089600 systemd[1]: Started flanneld.service - flannel - Network fabric for containers (System Application Container).
Sep  4 18:48:24.089804 systemd[1]: Reached target multi-user.target - Multi-User System.
Sep  4 18:48:24.090476 flannel-wrapper[1904]: I0904 18:48:24.090396       1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules
Sep  4 18:48:24.090476 flannel-wrapper[1904]: I0904 18:48:24.090402       1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN
Sep  4 18:48:24.090476 flannel-wrapper[1904]: I0904 18:48:24.090407       1 main.go:439] Waiting for 22h59m59.976435687s to renew lease
Sep  4 18:48:24.090576 flannel-wrapper[1904]: I0904 18:48:24.090528       1 udp_network_amd64.go:196] Subnet added: 10.254.18.0/24
Sep  4 18:48:24.090786 flannel-wrapper[1904]: I0904 18:48:24.090749       1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules
Sep  4 18:48:24.090786 flannel-wrapper[1904]: I0904 18:48:24.090756       1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -j ACCEPT
Sep  4 18:48:24.090954 flannel-wrapper[1904]: I0904 18:48:24.090922       1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully
Sep  4 18:48:24.091389 flannel-wrapper[1904]: I0904 18:48:24.091316       1 iptables.go:172] Deleting iptables rule: -d 10.254.0.0/16 -j ACCEPT
Sep  4 18:48:24.091429 flannel-wrapper[1904]: I0904 18:48:24.091381       1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.71.0/24 -j RETURN
Sep  4 18:48:24.091901 flannel-wrapper[1904]: I0904 18:48:24.091836       1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully
Sep  4 18:48:24.091901 flannel-wrapper[1904]: I0904 18:48:24.091838       1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -j ACCEPT
Sep  4 18:48:24.092321 flannel-wrapper[1904]: I0904 18:48:24.092278       1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN
Sep  4 18:48:24.092959 flannel-wrapper[1904]: I0904 18:48:24.092915       1 iptables.go:160] Adding iptables rule: -d 10.254.0.0/16 -j ACCEPT
Sep  4 18:48:24.093420 flannel-wrapper[1904]: I0904 18:48:24.093292       1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully
Sep  4 18:48:24.094470 flannel-wrapper[1904]: I0904 18:48:24.094315       1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.71.0/24 -j RETURN
Sep  4 18:48:24.095463 flannel-wrapper[1904]: I0904 18:48:24.095340       1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully
Sep  4 18:48:24.104429 systemd[1]: Starting flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)...
Sep  4 18:48:24.106366 sh[2042]: + for try in 1 2 3 4 5 6
Sep  4 18:48:24.106366 sh[2042]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i
Sep  4 18:48:24.116353 sh[2062]: Error response from daemon: No such container: flannel-docker-opts
Sep  4 18:48:24.123686 sh[2071]: Error response from daemon: No such container: flannel-docker-opts
Sep  4 18:48:24.164498 flannel-wrapper[1904]: I0904 18:48:24.164364       1 udp_network_amd64.go:196] Subnet added: 10.254.79.0/24
Sep  4 18:48:24.170396 containerd[1462]: time="2024-09-04T18:48:24.170350950Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Sep  4 18:48:24.170468 containerd[1462]: time="2024-09-04T18:48:24.170411183Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:24.170468 containerd[1462]: time="2024-09-04T18:48:24.170426210Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Sep  4 18:48:24.170468 containerd[1462]: time="2024-09-04T18:48:24.170432545Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:24.189347 systemd[1]: Started docker-1e20560573f113dd5f2f2b34974fb6ce593accbda3838b4c9dd5cf69968cc95b.scope - libcontainer container 1e20560573f113dd5f2f2b34974fb6ce593accbda3838b4c9dd5cf69968cc95b.
Sep  4 18:48:24.207004 systemd[1]: docker-1e20560573f113dd5f2f2b34974fb6ce593accbda3838b4c9dd5cf69968cc95b.scope: Deactivated successfully.
Sep  4 18:48:24.218375 dockerd[1542]: time="2024-09-04T18:48:24.218306453Z" level=info msg="ignoring event" container=1e20560573f113dd5f2f2b34974fb6ce593accbda3838b4c9dd5cf69968cc95b module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete"
Sep  4 18:48:24.218840 containerd[1462]: time="2024-09-04T18:48:24.218306188Z" level=info msg="shim disconnected" id=1e20560573f113dd5f2f2b34974fb6ce593accbda3838b4c9dd5cf69968cc95b namespace=moby
Sep  4 18:48:24.218840 containerd[1462]: time="2024-09-04T18:48:24.218378449Z" level=warning msg="cleaning up after shim disconnected" id=1e20560573f113dd5f2f2b34974fb6ce593accbda3838b4c9dd5cf69968cc95b namespace=moby
Sep  4 18:48:24.218840 containerd[1462]: time="2024-09-04T18:48:24.218394851Z" level=info msg="cleaning up dead shim" namespace=moby
Sep  4 18:48:24.237684 systemd[1]: Stopping docker.service - Docker Application Container Engine...
Sep  4 18:48:24.237864 dockerd[1542]: time="2024-09-04T18:48:24.237672217Z" level=info msg="Processing signal 'terminated'"
Sep  4 18:48:24.241396 flannel-wrapper[1904]: I0904 18:48:24.241117       1 main.go:376] shutdownHandler sent cancel signal...
Sep  4 18:48:24.241396 flannel-wrapper[1904]: I0904 18:48:24.241229       1 watch.go:174] context canceled, close receiver chan
Sep  4 18:48:24.241396 flannel-wrapper[1904]: I0904 18:48:24.241230       1 watch.go:40] context canceled, close receiver chan
Sep  4 18:48:24.241396 flannel-wrapper[1904]: I0904 18:48:24.241250       1 main.go:432] Stopped monitoring lease
Sep  4 18:48:24.241396 flannel-wrapper[1904]: I0904 18:48:24.241252       1 udp_network_amd64.go:114] evts chan closed
Sep  4 18:48:24.241396 flannel-wrapper[1904]: I0904 18:48:24.241258       1 main.go:345] Waiting for all goroutines to exit
Sep  4 18:48:24.241697 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.241Z","caller":"osutil/interrupt_unix.go:64","msg":"received signal; shutting down","signal":"terminated"}
Sep  4 18:48:24.241697 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.241Z","caller":"embed/etcd.go:367","msg":"closing etcd server","name":"46156ced210545c5a9b2eedd777b9f3f","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.67.80.51:2380"],"advertise-client-urls":["http://10.67.80.51:2379"]}
Sep  4 18:48:24.241697 etcd-wrapper[1713]: WARNING: 2024/09/04 18:48:24 [core] grpc: addrConn.createTransport failed to connect to {0.0.0.0:2379 0.0.0.0:2379 <nil> 0 <nil>}. Err: connection error: desc = "transport: Error while dialing dial tcp 0.0.0.0:2379: connect: connection refused". Reconnecting...
Sep  4 18:48:24.241738 systemd-networkd[1379]: flannel0: Link DOWN
Sep  4 18:48:24.241742 systemd-networkd[1379]: flannel0: Lost carrier
Sep  4 18:48:24.242720 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.242Z","caller":"etcdserver/server.go:1429","msg":"skipped leadership transfer; local server is not leader","local-member-id":"4269f11577e1bcfe","current-leader-member-id":"150a9745ca8d8653"}
Sep  4 18:48:24.242768 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.242834 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.242834 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.242939 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.242939 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.242991 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.243020 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16","error":"context canceled"}
Sep  4 18:48:24.243020 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"4a3893e07ab52c16","error":"failed to read 4a3893e07ab52c16 on stream MsgApp v2 (context canceled)"}
Sep  4 18:48:24.243076 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.242Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.243076 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16","error":"context canceled"}
Sep  4 18:48:24.243076 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.243076 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:24.243076 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.243308 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.243412 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.243922 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.243922 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.244001 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.243Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.244071 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653","error":"context canceled"}
Sep  4 18:48:24.244127 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"150a9745ca8d8653","error":"failed to read 150a9745ca8d8653 on stream MsgApp v2 (context canceled)"}
Sep  4 18:48:24.244127 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.244211 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653","error":"context canceled"}
Sep  4 18:48:24.244211 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.244211 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:24.244211 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"4269f11577e1bcfe","remote-peer-id-stream-handler":"4269f11577e1bcfe","remote-peer-id-from":"150a9745ca8d8653","cluster-id":"709caa4f2aac1b80"}
Sep  4 18:48:24.244211 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"4269f11577e1bcfe","remote-peer-id-stream-handler":"4269f11577e1bcfe","remote-peer-id-from":"4a3893e07ab52c16","cluster-id":"709caa4f2aac1b80"}
Sep  4 18:48:24.244336 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"4269f11577e1bcfe","remote-peer-id-stream-handler":"4269f11577e1bcfe","remote-peer-id-from":"150a9745ca8d8653","cluster-id":"709caa4f2aac1b80"}
Sep  4 18:48:24.244336 etcd-wrapper[1713]: {"level":"warn","ts":"2024-09-04T18:48:24.244Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"4269f11577e1bcfe","remote-peer-id-stream-handler":"4269f11577e1bcfe","remote-peer-id-from":"4a3893e07ab52c16","cluster-id":"709caa4f2aac1b80"}
Sep  4 18:48:24.244763 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.244Z","caller":"embed/etcd.go:562","msg":"stopping serving peer traffic","address":"10.67.80.51:2380"}
Sep  4 18:48:24.245752 systemd[1]: var-lib-docker-overlay2-a4c734cfcbd226ab0b8a5ba3502e12b6488a1a62b76a61606a7e26f41c722e0a-merged.mount: Deactivated successfully.
Sep  4 18:48:24.245914 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.245Z","caller":"embed/etcd.go:567","msg":"stopped serving peer traffic","address":"10.67.80.51:2380"}
Sep  4 18:48:24.245914 etcd-wrapper[1713]: {"level":"info","ts":"2024-09-04T18:48:24.245Z","caller":"embed/etcd.go:369","msg":"closed etcd server","name":"46156ced210545c5a9b2eedd777b9f3f","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.67.80.51:2380"],"advertise-client-urls":["http://10.67.80.51:2379"]}
Sep  4 18:48:24.247033 systemd[1]: docker-6a4857d6ac96c1f6f16f7d7b319bc95e6711acd819be47920b920e3dbdcdc79e.scope: Deactivated successfully.
Sep  4 18:48:24.253094 containerd[1462]: time="2024-09-04T18:48:24.253053517Z" level=info msg="shim disconnected" id=6a4857d6ac96c1f6f16f7d7b319bc95e6711acd819be47920b920e3dbdcdc79e namespace=moby
Sep  4 18:48:24.253178 containerd[1462]: time="2024-09-04T18:48:24.253098486Z" level=warning msg="cleaning up after shim disconnected" id=6a4857d6ac96c1f6f16f7d7b319bc95e6711acd819be47920b920e3dbdcdc79e namespace=moby
Sep  4 18:48:24.253178 containerd[1462]: time="2024-09-04T18:48:24.253104923Z" level=info msg="cleaning up dead shim" namespace=moby
Sep  4 18:48:24.253213 dockerd[1542]: time="2024-09-04T18:48:24.253110108Z" level=info msg="ignoring event" container=6a4857d6ac96c1f6f16f7d7b319bc95e6711acd819be47920b920e3dbdcdc79e module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete"
Sep  4 18:48:24.259514 flannel-wrapper[1904]: I0904 18:48:24.259352       1 main.go:348] Exiting cleanly...
Sep  4 18:48:24.260571 systemd[1]: docker-844cf1283089c1e248d640c89bf56a7809cd8ce6aa3fa4113888a5da97a978ca.scope: Deactivated successfully.
Sep  4 18:48:24.262950 systemd[1]: var-lib-docker-overlay2-d77a27e8c684167df0127177db18f995db64045be0ca452a0c336c4eb7571fb8-merged.mount: Deactivated successfully.
Sep  4 18:48:24.267366 containerd[1462]: time="2024-09-04T18:48:24.267271079Z" level=info msg="shim disconnected" id=844cf1283089c1e248d640c89bf56a7809cd8ce6aa3fa4113888a5da97a978ca namespace=moby
Sep  4 18:48:24.267366 containerd[1462]: time="2024-09-04T18:48:24.267341015Z" level=warning msg="cleaning up after shim disconnected" id=844cf1283089c1e248d640c89bf56a7809cd8ce6aa3fa4113888a5da97a978ca namespace=moby
Sep  4 18:48:24.267366 containerd[1462]: time="2024-09-04T18:48:24.267349871Z" level=info msg="cleaning up dead shim" namespace=moby
Sep  4 18:48:24.267494 dockerd[1542]: time="2024-09-04T18:48:24.267338178Z" level=info msg="ignoring event" container=844cf1283089c1e248d640c89bf56a7809cd8ce6aa3fa4113888a5da97a978ca module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete"
Sep  4 18:48:24.277279 systemd[1]: var-lib-docker-overlay2-8c94acfeda5c5c05e2aa52040992de15659834fa8d580443417df3366bbfe93b-merged.mount: Deactivated successfully.
Sep  4 18:48:24.297032 dockerd[1542]: time="2024-09-04T18:48:24.296984231Z" level=info msg="stopping event stream following graceful shutdown" error="<nil>" module=libcontainerd namespace=moby
Sep  4 18:48:24.297161 dockerd[1542]: time="2024-09-04T18:48:24.297117595Z" level=info msg="Daemon shutdown complete"
Sep  4 18:48:24.308379 systemd[1]: docker.service: Deactivated successfully.
Sep  4 18:48:24.308541 systemd[1]: Stopped docker.service - Docker Application Container Engine.
Sep  4 18:48:24.308571 systemd[1]: docker.service: Consumed 3.318s CPU time.
Sep  4 18:48:24.308895 systemd[1]: docker.socket: Deactivated successfully.
Sep  4 18:48:24.309096 systemd[1]: Closed docker.socket - Docker Socket for the API.
Sep  4 18:48:24.309118 systemd[1]: Stopping docker.socket - Docker Socket for the API...
Sep  4 18:48:24.309247 docker[2225]: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?
Sep  4 18:48:24.309388 docker[2208]: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?
Sep  4 18:48:24.310031 systemd[1]: Starting docker.socket - Docker Socket for the API...
Sep  4 18:48:24.310229 systemd[1]: etcd-member.service: Control process exited, code=exited, status=1/FAILURE
Sep  4 18:48:24.310798 systemd[1]: flanneld.service: Control process exited, code=exited, status=1/FAILURE
Sep  4 18:48:24.311227 systemd[1]: Listening on docker.socket - Docker Socket for the API.
Sep  4 18:48:24.312698 systemd[1]: Starting docker.service - Docker Application Container Engine...
Sep  4 18:48:24.315154 (dockerd)[2240]: docker.service: Referenced but unset environment variable evaluates to an empty string: DOCKER_CGROUPS, DOCKER_OPTS
Sep  4 18:48:24.335637 dockerd[2240]: time="2024-09-04T18:48:24.335579707Z" level=info msg="Starting up"
Sep  4 18:48:24.357406 dockerd[2240]: time="2024-09-04T18:48:24.357388544Z" level=info msg="[graphdriver] using prior storage driver: overlay2"
Sep  4 18:48:24.367126 dockerd[2240]: time="2024-09-04T18:48:24.367085994Z" level=info msg="Loading containers: start."
Sep  4 18:48:24.726271 dockerd[2240]: time="2024-09-04T18:48:24.726223441Z" level=info msg="Loading containers: done."
Sep  4 18:48:24.739310 dockerd[2240]: time="2024-09-04T18:48:24.739266122Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Sep  4 18:48:24.739381 dockerd[2240]: time="2024-09-04T18:48:24.739357893Z" level=info msg="Docker daemon" commit=fca702de7f71362c8d103073c7e4a1d0a467fadd graphdriver=overlay2 version=24.0.9
Sep  4 18:48:24.739401 dockerd[2240]: time="2024-09-04T18:48:24.739381195Z" level=info msg="Daemon has completed initialization"
Sep  4 18:48:24.748715 dockerd[2240]: time="2024-09-04T18:48:24.748692174Z" level=info msg="API listen on /run/docker.sock"
Sep  4 18:48:24.748782 systemd[1]: Started docker.service - Docker Application Container Engine.
Sep  4 18:48:24.749502 sh[2060]: Restarted Docker to apply Flannel options
Sep  4 18:48:24.749778 sh[2042]: + break
Sep  4 18:48:24.749778 sh[2042]: + '[' 1 '!=' fail ']'
Sep  4 18:48:24.749984 systemd[1]: Finished flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container).
Sep  4 18:48:24.750108 systemd[1]: Startup finished in 2.729s (kernel) + 7.622s (initrd) + 32.278s (userspace) = 42.629s.
Sep  4 18:48:24.751203 docker[2237]: flannel
Sep  4 18:48:24.751309 docker[2236]: etcd-member
Sep  4 18:48:24.751854 systemd[1]: flanneld.service: Failed with result 'exit-code'.
Sep  4 18:48:24.752211 systemd[1]: etcd-member.service: Failed with result 'exit-code'.
Sep  4 18:48:25.991294 systemd-timesyncd[1381]: Contacted time server [2606:4700:f1::1]:123 (2.flatcar.pool.ntp.org).
Sep  4 18:48:25.991416 systemd-timesyncd[1381]: Initial clock synchronization to Wed 2024-09-04 18:48:25.690905 UTC.
Sep  4 18:48:26.854559 systemd[1]: Started sshd@5-147.75.203.91:22-139.178.89.65:60166.service - OpenSSH per-connection server daemon (139.178.89.65:60166).
Sep  4 18:48:26.883633 sshd[2403]: Accepted publickey for core from 139.178.89.65 port 60166 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:26.884373 sshd[2403]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:26.887137 systemd-logind[1446]: New session 8 of user core.
Sep  4 18:48:26.903524 systemd[1]: Started session-8.scope - Session 8 of User core.
Sep  4 18:48:26.956293 sshd[2403]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:26.967604 systemd[1]: sshd@5-147.75.203.91:22-139.178.89.65:60166.service: Deactivated successfully.
Sep  4 18:48:26.968379 systemd[1]: session-8.scope: Deactivated successfully.
Sep  4 18:48:26.969123 systemd-logind[1446]: Session 8 logged out. Waiting for processes to exit.
Sep  4 18:48:26.969784 systemd[1]: Started sshd@6-147.75.203.91:22-139.178.89.65:60176.service - OpenSSH per-connection server daemon (139.178.89.65:60176).
Sep  4 18:48:26.970278 systemd-logind[1446]: Removed session 8.
Sep  4 18:48:26.998846 sshd[2410]: Accepted publickey for core from 139.178.89.65 port 60176 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:26.999666 sshd[2410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:27.002804 systemd-logind[1446]: New session 9 of user core.
Sep  4 18:48:27.013347 systemd[1]: Started session-9.scope - Session 9 of User core.
Sep  4 18:48:27.065266 sshd[2410]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:27.073632 systemd[1]: sshd@6-147.75.203.91:22-139.178.89.65:60176.service: Deactivated successfully.
Sep  4 18:48:27.074354 systemd[1]: session-9.scope: Deactivated successfully.
Sep  4 18:48:27.075068 systemd-logind[1446]: Session 9 logged out. Waiting for processes to exit.
Sep  4 18:48:27.075710 systemd[1]: Started sshd@7-147.75.203.91:22-139.178.89.65:60186.service - OpenSSH per-connection server daemon (139.178.89.65:60186).
Sep  4 18:48:27.076180 systemd-logind[1446]: Removed session 9.
Sep  4 18:48:27.105122 sshd[2417]: Accepted publickey for core from 139.178.89.65 port 60186 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:27.106321 sshd[2417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:27.110864 systemd-logind[1446]: New session 10 of user core.
Sep  4 18:48:27.121471 systemd[1]: Started session-10.scope - Session 10 of User core.
Sep  4 18:48:27.188546 sshd[2417]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:27.216071 systemd[1]: sshd@7-147.75.203.91:22-139.178.89.65:60186.service: Deactivated successfully.
Sep  4 18:48:27.216898 systemd[1]: session-10.scope: Deactivated successfully.
Sep  4 18:48:27.217589 systemd-logind[1446]: Session 10 logged out. Waiting for processes to exit.
Sep  4 18:48:27.218172 systemd[1]: Started sshd@8-147.75.203.91:22-139.178.89.65:60198.service - OpenSSH per-connection server daemon (139.178.89.65:60198).
Sep  4 18:48:27.218691 systemd-logind[1446]: Removed session 10.
Sep  4 18:48:27.245579 sshd[2424]: Accepted publickey for core from 139.178.89.65 port 60198 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:27.246468 sshd[2424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:27.249889 systemd-logind[1446]: New session 11 of user core.
Sep  4 18:48:27.258370 systemd[1]: Started session-11.scope - Session 11 of User core.
Sep  4 18:48:27.321194 sudo[2427]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Sep  4 18:48:27.321329 sudo[2427]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Sep  4 18:48:27.334512 sudo[2427]: pam_unix(sudo:session): session closed for user root
Sep  4 18:48:27.335371 sshd[2424]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:27.361118 systemd[1]: sshd@8-147.75.203.91:22-139.178.89.65:60198.service: Deactivated successfully.
Sep  4 18:48:27.364883 systemd[1]: session-11.scope: Deactivated successfully.
Sep  4 18:48:27.368239 systemd-logind[1446]: Session 11 logged out. Waiting for processes to exit.
Sep  4 18:48:27.381012 systemd[1]: Started sshd@9-147.75.203.91:22-139.178.89.65:60210.service - OpenSSH per-connection server daemon (139.178.89.65:60210).
Sep  4 18:48:27.383311 systemd-logind[1446]: Removed session 11.
Sep  4 18:48:27.431735 sshd[2432]: Accepted publickey for core from 139.178.89.65 port 60210 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 18:48:27.433115 sshd[2432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 18:48:27.437918 systemd-logind[1446]: New session 12 of user core.
Sep  4 18:48:27.457659 systemd[1]: Started session-12.scope - Session 12 of User core.
Sep  4 18:48:27.518758 sudo[2436]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Sep  4 18:48:27.518891 sudo[2436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Sep  4 18:48:27.520737 sudo[2436]: pam_unix(sudo:session): session closed for user root
Sep  4 18:48:27.523257 sudo[2435]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Sep  4 18:48:27.523391 sudo[2435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Sep  4 18:48:27.551644 systemd[1]: Stopping audit-rules.service - Load Security Auditing Rules...
Sep  4 18:48:27.553078 auditctl[2439]: No rules
Sep  4 18:48:27.553860 systemd[1]: audit-rules.service: Deactivated successfully.
Sep  4 18:48:27.554040 systemd[1]: Stopped audit-rules.service - Load Security Auditing Rules.
Sep  4 18:48:27.555643 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules...
Sep  4 18:48:27.572029 augenrules[2457]: No rules
Sep  4 18:48:27.572344 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules.
Sep  4 18:48:27.572904 sudo[2435]: pam_unix(sudo:session): session closed for user root
Sep  4 18:48:27.573976 sshd[2432]: pam_unix(sshd:session): session closed for user core
Sep  4 18:48:27.575547 systemd[1]: sshd@9-147.75.203.91:22-139.178.89.65:60210.service: Deactivated successfully.
Sep  4 18:48:27.576378 systemd[1]: session-12.scope: Deactivated successfully.
Sep  4 18:48:27.577101 systemd-logind[1446]: Session 12 logged out. Waiting for processes to exit.
Sep  4 18:48:27.577804 systemd-logind[1446]: Removed session 12.
Sep  4 18:48:34.941653 systemd[1]: flanneld.service: Scheduled restart job, restart counter is at 1.
Sep  4 18:48:34.943686 systemd[1]: etcd-member.service: Scheduled restart job, restart counter is at 1.
Sep  4 18:48:34.954391 systemd[1]: Stopping flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)...
Sep  4 18:48:34.961813 docker[2464]: flannel-docker-opts
Sep  4 18:48:34.975093 docker[2474]: flannel-docker-opts
Sep  4 18:48:34.975753 systemd[1]: flannel-docker-opts.service: Deactivated successfully.
Sep  4 18:48:34.975886 systemd[1]: Stopped flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container).
Sep  4 18:48:34.976500 systemd[1]: Stopped flanneld.service - flannel - Network fabric for containers (System Application Container).
Sep  4 18:48:34.977389 systemd[1]: Starting etcd-member.service - etcd (System Application Container)...
Sep  4 18:48:34.979920 (-wrapper)[2486]: etcd-member.service: Referenced but unset environment variable evaluates to an empty string: ETCD_OPTS
Sep  4 18:48:34.990760 etcd-wrapper[2490]: Error response from daemon: No such container: etcd-member
Sep  4 18:48:34.998873 etcd-wrapper[2499]: Error response from daemon: No such container: etcd-member
Sep  4 18:48:35.018546 systemd[1]: var-lib-docker-overlay2-c9097417c416264b325dbdbf131339ce21dc1e971d875ad433a7863ffae9a0ed\x2dinit-merged.mount: Deactivated successfully.
Sep  4 18:48:35.048401 containerd[1462]: time="2024-09-04T18:48:35.048355773Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Sep  4 18:48:35.048401 containerd[1462]: time="2024-09-04T18:48:35.048395917Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:35.048684 containerd[1462]: time="2024-09-04T18:48:35.048412629Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Sep  4 18:48:35.048684 containerd[1462]: time="2024-09-04T18:48:35.048611373Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:35.061429 systemd[1]: Started docker-9729ad97db98af35cbb39827b6b8a6cbc79611566f4ded7066581251d76c3bc7.scope - libcontainer container 9729ad97db98af35cbb39827b6b8a6cbc79611566f4ded7066581251d76c3bc7.
Sep  4 18:48:35.094405 etcd-wrapper[2519]: {"level":"info","ts":1725475715.0942347,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"}
Sep  4 18:48:35.094405 etcd-wrapper[2519]: {"level":"info","ts":1725475715.0942864,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"46156ced210545c5a9b2eedd777b9f3f"}
Sep  4 18:48:35.094405 etcd-wrapper[2519]: {"level":"warn","ts":1725475715.0943062,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"}
Sep  4 18:48:35.094405 etcd-wrapper[2519]: {"level":"warn","ts":1725475715.0943136,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"}
Sep  4 18:48:35.094405 etcd-wrapper[2519]: {"level":"warn","ts":1725475715.094318,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"}
Sep  4 18:48:35.094405 etcd-wrapper[2519]: {"level":"warn","ts":1725475715.094321,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"}
Sep  4 18:48:35.094813 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.094Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.51:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.51:2380","--advertise-client-urls=http://10.67.80.51:2379","--discovery=https://discovery.etcd.io/0dfefd10b1593f9b1d0d40a261903eb3","--enable-v2=true"]}
Sep  4 18:48:35.094813 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.094Z","caller":"etcdmain/etcd.go:115","msg":"server has been already initialized","data-dir":"/var/lib/etcd","dir-type":"member"}
Sep  4 18:48:35.094813 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.094Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.51:2380"]}
Sep  4 18:48:35.094813 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.094Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]}
Sep  4 18:48:35.094910 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.094Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":true,"name":"46156ced210545c5a9b2eedd777b9f3f","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.51:2380"],"listen-peer-urls":["http://10.67.80.51:2380"],"advertise-client-urls":["http://10.67.80.51:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"","initial-cluster-state":"new","initial-cluster-token":"","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/0dfefd10b1593f9b1d0d40a261903eb3","discovery-proxy":"","downgrade-check-interval":"5s"}
Sep  4 18:48:35.094978 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.094Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"76.506µs"}
Sep  4 18:48:35.095010 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:35.094Z","caller":"etcdserver/server.go:480","msg":"discovery token is ignored since cluster already initialized; valid logs are found","wal-dir":"/var/lib/etcd/member/wal"}
Sep  4 18:48:35.095077 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","caller":"etcdserver/server.go:526","msg":"No snapshot found. Recovering WAL from scratch!"}
Sep  4 18:48:35.095512 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","caller":"etcdserver/raft.go:483","msg":"restarting local member","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","commit-index":29}
Sep  4 18:48:35.095762 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=()"}
Sep  4 18:48:35.095762 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became follower at term 2"}
Sep  4 18:48:35.095822 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 4269f11577e1bcfe [peers: [], term: 2, commit: 29, applied: 0, lastindex: 29, lastterm: 2]"}
Sep  4 18:48:35.095881 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"}
Sep  4 18:48:35.095881 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","recovered-remote-peer-id":"150a9745ca8d8653","recovered-remote-peer-urls":["http://10.67.80.81:2380"]}
Sep  4 18:48:35.095881 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","recovered-remote-peer-id":"4269f11577e1bcfe","recovered-remote-peer-urls":["http://10.67.80.51:2380"]}
Sep  4 18:48:35.095881 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","recovered-remote-peer-id":"4a3893e07ab52c16","recovered-remote-peer-urls":["http://10.67.80.59:2380"]}
Sep  4 18:48:35.095881 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.095Z","caller":"membership/cluster.go:285","msg":"set cluster version from store","cluster-version":"3.5"}
Sep  4 18:48:35.103999 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:35.103Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"}
Sep  4 18:48:35.104383 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.104Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1}
Sep  4 18:48:35.104476 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.104Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"}
Sep  4 18:48:35.104633 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.104Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:35.104633 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.104Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:35.104853 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.104Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:35.105067 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:35.105505 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:35.105505 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:35.105505 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653","remote-peer-urls":["http://10.67.80.81:2380"]}
Sep  4 18:48:35.105505 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:35.105505 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:35.105671 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:35.105711 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:35.106025 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.105Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:35.106194 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:35.106194 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:35.106253 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16","remote-peer-urls":["http://10.67.80.59:2380"]}
Sep  4 18:48:35.106253 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"etcdserver/server.go:834","msg":"starting etcd server","local-member-id":"4269f11577e1bcfe","local-server-version":"3.5.0","cluster-id":"709caa4f2aac1b80","cluster-version":"3.5"}
Sep  4 18:48:35.106414 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"4a3893e07ab52c16"}
Sep  4 18:48:35.106414 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10}
Sep  4 18:48:35.106566 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411)"}
Sep  4 18:48:35.106611 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","added-peer-id":"150a9745ca8d8653","added-peer-peer-urls":["http://10.67.80.81:2380"]}
Sep  4 18:48:35.106634 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411 4785621153565752574)"}
Sep  4 18:48:35.106657 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","added-peer-id":"4269f11577e1bcfe","added-peer-peer-urls":["http://10.67.80.51:2380"]}
Sep  4 18:48:35.106657 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe switched to configuration voters=(1516190550570403411 4785621153565752574 5348187149843115030)"}
Sep  4 18:48:35.106698 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","added-peer-id":"4a3893e07ab52c16","added-peer-peer-urls":["http://10.67.80.59:2380"]}
Sep  4 18:48:35.106729 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.106Z","caller":"membership/cluster.go:523","msg":"updated cluster version","cluster-id":"709caa4f2aac1b80","local-member-id":"4269f11577e1bcfe","from":"3.5","to":"3.5"}
Sep  4 18:48:35.107380 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:35.107Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."}
Sep  4 18:48:35.107415 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.107Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"4269f11577e1bcfe","initial-advertise-peer-urls":["http://10.67.80.51:2380"],"listen-peer-urls":["http://10.67.80.51:2380"],"advertise-client-urls":["http://10.67.80.51:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]}
Sep  4 18:48:35.107415 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.107Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.51:2380"}
Sep  4 18:48:35.107415 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:35.107Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.51:2380"}
Sep  4 18:48:35.433069 systemd[1]: Started sshd@10-147.75.203.91:22-61.177.172.140:19031.service - OpenSSH per-connection server daemon (61.177.172.140:19031).
Sep  4 18:48:36.296591 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:36.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe is starting a new election at term 2"}
Sep  4 18:48:36.296591 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:36.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became pre-candidate at term 2"}
Sep  4 18:48:36.296591 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:36.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe received MsgPreVoteResp from 4269f11577e1bcfe at term 2"}
Sep  4 18:48:36.296591 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:36.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 150a9745ca8d8653 at term 2"}
Sep  4 18:48:36.296591 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:36.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 4a3893e07ab52c16 at term 2"}
Sep  4 18:48:36.473931 sshd[2584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:37.497250 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:37.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe is starting a new election at term 2"}
Sep  4 18:48:37.497250 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:37.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became pre-candidate at term 2"}
Sep  4 18:48:37.497250 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:37.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe received MsgPreVoteResp from 4269f11577e1bcfe at term 2"}
Sep  4 18:48:37.497250 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:37.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 150a9745ca8d8653 at term 2"}
Sep  4 18:48:37.497250 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:37.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 4a3893e07ab52c16 at term 2"}
Sep  4 18:48:38.697426 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:38.696Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe is starting a new election at term 2"}
Sep  4 18:48:38.697426 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:38.696Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became pre-candidate at term 2"}
Sep  4 18:48:38.697426 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:38.696Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe received MsgPreVoteResp from 4269f11577e1bcfe at term 2"}
Sep  4 18:48:38.697426 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:38.696Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 150a9745ca8d8653 at term 2"}
Sep  4 18:48:38.697426 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:38.696Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 4a3893e07ab52c16 at term 2"}
Sep  4 18:48:38.904607 sshd[2582]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:39.179345 sshd[2585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:39.897308 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:39.896Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe is starting a new election at term 2"}
Sep  4 18:48:39.897308 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:39.896Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became pre-candidate at term 2"}
Sep  4 18:48:39.897308 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:39.896Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe received MsgPreVoteResp from 4269f11577e1bcfe at term 2"}
Sep  4 18:48:39.897308 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:39.896Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 150a9745ca8d8653 at term 2"}
Sep  4 18:48:39.897308 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:39.896Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 4a3893e07ab52c16 at term 2"}
Sep  4 18:48:40.107316 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:40.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"150a9745ca8d8653","rtt":"0s","error":"dial tcp 10.67.80.81:2380: connect: connection refused"}
Sep  4 18:48:40.107316 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:40.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"150a9745ca8d8653","rtt":"0s","error":"dial tcp 10.67.80.81:2380: connect: connection refused"}
Sep  4 18:48:40.107316 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:40.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s"}
Sep  4 18:48:40.107316 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:40.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s"}
Sep  4 18:48:40.687731 sshd[2582]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:40.963089 sshd[2586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:41.097359 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:41.096Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe is starting a new election at term 2"}
Sep  4 18:48:41.097359 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:41.096Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became pre-candidate at term 2"}
Sep  4 18:48:41.097359 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:41.096Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe received MsgPreVoteResp from 4269f11577e1bcfe at term 2"}
Sep  4 18:48:41.097359 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:41.096Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 150a9745ca8d8653 at term 2"}
Sep  4 18:48:41.097359 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:41.096Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 4a3893e07ab52c16 at term 2"}
Sep  4 18:48:42.107696 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:42.107Z","caller":"etcdserver/server.go:2048","msg":"failed to publish local member to cluster through raft","local-member-id":"4269f11577e1bcfe","local-member-attributes":"{Name:46156ced210545c5a9b2eedd777b9f3f ClientURLs:[http://10.67.80.51:2379]}","request-path":"/0/members/4269f11577e1bcfe/attributes","publish-timeout":"7s","error":"etcdserver: request timed out"}
Sep  4 18:48:42.296826 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe is starting a new election at term 2"}
Sep  4 18:48:42.296826 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became pre-candidate at term 2"}
Sep  4 18:48:42.296826 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe received MsgPreVoteResp from 4269f11577e1bcfe at term 2"}
Sep  4 18:48:42.296826 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 150a9745ca8d8653 at term 2"}
Sep  4 18:48:42.296826 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.296Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 4a3893e07ab52c16 at term 2"}
Sep  4 18:48:42.376660 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.376Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"4269f11577e1bcfe","to":"150a9745ca8d8653","stream-type":"stream Message"}
Sep  4 18:48:42.376660 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.376Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"150a9745ca8d8653"}
Sep  4 18:48:42.376660 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.376Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"4269f11577e1bcfe","to":"150a9745ca8d8653","stream-type":"stream MsgApp v2"}
Sep  4 18:48:42.376660 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.376Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:42.376660 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.376Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:42.408560 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.407Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:42.408560 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:42.408Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"4269f11577e1bcfe","remote-peer-id":"150a9745ca8d8653"}
Sep  4 18:48:42.942775 sshd[2582]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:43.079662 sshd[2582]: Received disconnect from 61.177.172.140 port 19031:11:  [preauth]
Sep  4 18:48:43.079662 sshd[2582]: Disconnected from authenticating user root 61.177.172.140 port 19031 [preauth]
Sep  4 18:48:43.083053 systemd[1]: sshd@10-147.75.203.91:22-61.177.172.140:19031.service: Deactivated successfully.
Sep  4 18:48:43.128335 update_engine[1451]: I0904 18:48:43.128268  1451 update_attempter.cc:509] Updating boot flags...
Sep  4 18:48:43.164197 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (2598)
Sep  4 18:48:43.208193 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (2601)
Sep  4 18:48:43.232822 systemd[1]: Started sshd@11-147.75.203.91:22-61.177.172.140:13222.service - OpenSSH per-connection server daemon (61.177.172.140:13222).
Sep  4 18:48:43.234187 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 33 scanned by (udev-worker) (2601)
Sep  4 18:48:43.496635 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.495Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe is starting a new election at term 2"}
Sep  4 18:48:43.496635 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became pre-candidate at term 2"}
Sep  4 18:48:43.496635 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe received MsgPreVoteResp from 4269f11577e1bcfe at term 2"}
Sep  4 18:48:43.496635 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 150a9745ca8d8653 at term 2"}
Sep  4 18:48:43.496635 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.496Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29] sent MsgPreVote request to 4a3893e07ab52c16 at term 2"}
Sep  4 18:48:43.498099 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.497Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [term: 2] received a MsgPreVoteResp message with higher term from 150a9745ca8d8653 [term: 4]"}
Sep  4 18:48:43.498099 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.497Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became follower at term 4"}
Sep  4 18:48:43.570124 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.569Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29, vote: 0] cast MsgPreVote for 150a9745ca8d8653 [logterm: 4, index: 36] at term 4"}
Sep  4 18:48:43.572164 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.571Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [term: 4] received a MsgVote message with higher term from 150a9745ca8d8653 [term: 5]"}
Sep  4 18:48:43.572164 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.571Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe became follower at term 5"}
Sep  4 18:48:43.572164 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.571Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"4269f11577e1bcfe [logterm: 2, index: 29, vote: 0] cast MsgVote for 150a9745ca8d8653 [logterm: 4, index: 36] at term 5"}
Sep  4 18:48:43.573148 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.572Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 4269f11577e1bcfe elected leader 150a9745ca8d8653 at term 5"}
Sep  4 18:48:43.575040 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.574Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"4269f11577e1bcfe","local-member-attributes":"{Name:46156ced210545c5a9b2eedd777b9f3f ClientURLs:[http://10.67.80.51:2379]}","request-path":"/0/members/4269f11577e1bcfe/attributes","cluster-id":"709caa4f2aac1b80","publish-timeout":"7s"}
Sep  4 18:48:43.575040 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.574Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"}
Sep  4 18:48:43.575040 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.574Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"}
Sep  4 18:48:43.575286 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.575Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"}
Sep  4 18:48:43.575240 systemd[1]: Started etcd-member.service - etcd (System Application Container).
Sep  4 18:48:43.575628 etcd-wrapper[2519]: {"level":"info","ts":"2024-09-04T18:48:43.575Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"}
Sep  4 18:48:43.590613 systemd[1]: Starting flanneld.service - flannel - Network fabric for containers (System Application Container)...
Sep  4 18:48:44.266759 sshd[2624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:45.107809 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:45.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:48:45.107809 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:45.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:48:45.608625 etcdctl[2615]: { "Network": "10.254.0.0/16", "Backend": {"Type": "udp"} }
Sep  4 18:48:45.628885 flannel-wrapper[2628]: Error response from daemon: No such container: flannel
Sep  4 18:48:45.636667 flannel-wrapper[2638]: Error response from daemon: No such container: flannel
Sep  4 18:48:45.652114 systemd[1]: var-lib-docker-overlay2-cf429a992f9ae047bcc3c380c731a45e6dbb5c2edd7b55262c65df1d8d93a787\x2dinit-merged.mount: Deactivated successfully.
Sep  4 18:48:45.670393 containerd[1462]: time="2024-09-04T18:48:45.670277808Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Sep  4 18:48:45.670618 containerd[1462]: time="2024-09-04T18:48:45.670489482Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:45.670618 containerd[1462]: time="2024-09-04T18:48:45.670502005Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Sep  4 18:48:45.670618 containerd[1462]: time="2024-09-04T18:48:45.670508657Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:45.689388 systemd[1]: Started docker-9dbadcfdf8d2fe5b4b0272e316e4d01161347c3ca4fd46730194f063aaab71ce.scope - libcontainer container 9dbadcfdf8d2fe5b4b0272e316e4d01161347c3ca4fd46730194f063aaab71ce.
Sep  4 18:48:45.710887 flannel-wrapper[2656]: I0904 18:48:45.709441       1 main.go:520] Determining IP address of default interface
Sep  4 18:48:45.710887 flannel-wrapper[2656]: I0904 18:48:45.709649       1 main.go:533] Using interface with name bond0 and address 147.75.203.91
Sep  4 18:48:45.710887 flannel-wrapper[2656]: I0904 18:48:45.709657       1 main.go:550] Defaulting external address to interface address (147.75.203.91)
Sep  4 18:48:45.710887 flannel-wrapper[2656]: I0904 18:48:45.709781       1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: 10.254.71.0/24
Sep  4 18:48:45.710887 flannel-wrapper[2656]: I0904 18:48:45.709785       1 main.go:257] Installing signal handlers
Sep  4 18:48:45.712833 flannel-wrapper[2656]: I0904 18:48:45.712716       1 main.go:392] Found network config - Backend type: udp
Sep  4 18:48:45.714546 flannel-wrapper[2656]: I0904 18:48:45.714450       1 local_manager.go:147] Found lease (10.254.71.0/24) for current IP (147.75.203.91), reusing
Sep  4 18:48:45.716207 systemd-networkd[1379]: flannel0: Link UP
Sep  4 18:48:45.716211 systemd-networkd[1379]: flannel0: Gained carrier
Sep  4 18:48:45.716439 flannel-wrapper[2656]: I0904 18:48:45.716309       1 main.go:307] Setting up masking rules
Sep  4 18:48:45.716311 systemd-networkd[1379]: flannel0: Gained IPv6LL
Sep  4 18:48:45.723549 flannel-wrapper[2656]: I0904 18:48:45.723338       1 main.go:315] Changing default FORWARD chain policy to ACCEPT
Sep  4 18:48:45.723549 flannel-wrapper[2656]: I0904 18:48:45.723407       1 main.go:323] Wrote subnet file to /run/flannel/subnet.env
Sep  4 18:48:45.723549 flannel-wrapper[2656]: I0904 18:48:45.723412       1 main.go:327] Running backend.
Sep  4 18:48:45.723665 flannel-wrapper[2656]: I0904 18:48:45.723499       1 udp_network_amd64.go:100] Watching for new subnet leases
Sep  4 18:48:45.723612 systemd[1]: Started flanneld.service - flannel - Network fabric for containers (System Application Container).
Sep  4 18:48:45.726179 flannel-wrapper[2656]: I0904 18:48:45.726090       1 main.go:439] Waiting for 22h59m59.988556727s to renew lease
Sep  4 18:48:45.727025 flannel-wrapper[2656]: I0904 18:48:45.726870       1 udp_network_amd64.go:196] Subnet added: 10.254.18.0/24
Sep  4 18:48:45.727025 flannel-wrapper[2656]: I0904 18:48:45.726882       1 udp_network_amd64.go:196] Subnet added: 10.254.79.0/24
Sep  4 18:48:45.743479 systemd[1]: Starting flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)...
Sep  4 18:48:45.745494 sh[2746]: + for try in 1 2 3 4 5 6
Sep  4 18:48:45.745494 sh[2746]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i
Sep  4 18:48:45.756117 sh[2753]: Error response from daemon: No such container: flannel-docker-opts
Sep  4 18:48:45.765531 sh[2763]: Error response from daemon: No such container: flannel-docker-opts
Sep  4 18:48:45.794209 sshd[2610]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:45.799237 containerd[1462]: time="2024-09-04T18:48:45.799194407Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Sep  4 18:48:45.799422 containerd[1462]: time="2024-09-04T18:48:45.799407179Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:45.799458 containerd[1462]: time="2024-09-04T18:48:45.799425240Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Sep  4 18:48:45.799458 containerd[1462]: time="2024-09-04T18:48:45.799437091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Sep  4 18:48:45.818396 systemd[1]: Started docker-e6a3fd276bdcdf86528245d586bae1ab979048757aa2cc1c23d69067a19ce315.scope - libcontainer container e6a3fd276bdcdf86528245d586bae1ab979048757aa2cc1c23d69067a19ce315.
Sep  4 18:48:45.831356 systemd[1]: docker-e6a3fd276bdcdf86528245d586bae1ab979048757aa2cc1c23d69067a19ce315.scope: Deactivated successfully.
Sep  4 18:48:45.836975 containerd[1462]: time="2024-09-04T18:48:45.836923786Z" level=info msg="shim disconnected" id=e6a3fd276bdcdf86528245d586bae1ab979048757aa2cc1c23d69067a19ce315 namespace=moby
Sep  4 18:48:45.836975 containerd[1462]: time="2024-09-04T18:48:45.836965567Z" level=warning msg="cleaning up after shim disconnected" id=e6a3fd276bdcdf86528245d586bae1ab979048757aa2cc1c23d69067a19ce315 namespace=moby
Sep  4 18:48:45.836975 containerd[1462]: time="2024-09-04T18:48:45.836972522Z" level=info msg="cleaning up dead shim" namespace=moby
Sep  4 18:48:45.837181 dockerd[2240]: time="2024-09-04T18:48:45.837056800Z" level=info msg="ignoring event" container=e6a3fd276bdcdf86528245d586bae1ab979048757aa2cc1c23d69067a19ce315 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete"
Sep  4 18:48:45.848780 sh[2746]: + break
Sep  4 18:48:45.848780 sh[2746]: + '[' 1 '!=' fail ']'
Sep  4 18:48:45.849138 systemd[1]: Finished flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container).
Sep  4 18:48:46.065568 sshd[2856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:46.065935 sshd[2856]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked
Sep  4 18:48:47.535641 systemd[1]: Started sshd@12-147.75.203.91:22-218.92.0.113:43157.service - OpenSSH per-connection server daemon (218.92.0.113:43157).
Sep  4 18:48:48.065608 sshd[2610]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:48.337189 sshd[2860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:48.716883 sshd[2861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:48:50.108948 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:50.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:48:50.108948 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:50.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:48:50.748520 sshd[2610]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:50.883524 sshd[2610]: Received disconnect from 61.177.172.140 port 13222:11:  [preauth]
Sep  4 18:48:50.883524 sshd[2610]: Disconnected from authenticating user root 61.177.172.140 port 13222 [preauth]
Sep  4 18:48:50.886903 systemd[1]: sshd@11-147.75.203.91:22-61.177.172.140:13222.service: Deactivated successfully.
Sep  4 18:48:51.044503 systemd[1]: Started sshd@13-147.75.203.91:22-61.177.172.140:63018.service - OpenSSH per-connection server daemon (61.177.172.140:63018).
Sep  4 18:48:51.128353 sshd[2858]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:48:51.460894 sshd[2873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:48:52.077700 sshd[2874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:52.949365 sshd[2858]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:48:53.281562 sshd[2875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:48:53.566193 sshd[2871]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:53.838398 sshd[2876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:55.108995 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:55.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:48:55.108995 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:48:55.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:48:55.377347 sshd[2858]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:48:55.540016 sshd[2858]: Received disconnect from 218.92.0.113 port 43157:11:  [preauth]
Sep  4 18:48:55.540016 sshd[2858]: Disconnected from authenticating user root 218.92.0.113 port 43157 [preauth]
Sep  4 18:48:55.543370 systemd[1]: sshd@12-147.75.203.91:22-218.92.0.113:43157.service: Deactivated successfully.
Sep  4 18:48:55.738909 systemd[1]: Started sshd@14-147.75.203.91:22-218.92.0.113:45322.service - OpenSSH per-connection server daemon (218.92.0.113:45322).
Sep  4 18:48:55.933929 sshd[2871]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:56.175210 systemd[1]: Started sshd@15-147.75.203.91:22-193.32.162.38:57534.service - OpenSSH per-connection server daemon (193.32.162.38:57534).
Sep  4 18:48:56.205651 sshd[2888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.140  user=root
Sep  4 18:48:56.894569 sshd[2890]: Invalid user fwupgrade from 193.32.162.38 port 57534
Sep  4 18:48:56.969604 sshd[2892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:48:57.070075 sshd[2890]: Connection closed by invalid user fwupgrade 193.32.162.38 port 57534 [preauth]
Sep  4 18:48:57.073213 systemd[1]: sshd@15-147.75.203.91:22-193.32.162.38:57534.service: Deactivated successfully.
Sep  4 18:48:57.713802 sshd[2871]: PAM: Permission denied for root from 61.177.172.140
Sep  4 18:48:57.848794 sshd[2871]: Received disconnect from 61.177.172.140 port 63018:11:  [preauth]
Sep  4 18:48:57.848794 sshd[2871]: Disconnected from authenticating user root 61.177.172.140 port 63018 [preauth]
Sep  4 18:48:57.850282 systemd[1]: sshd@13-147.75.203.91:22-61.177.172.140:63018.service: Deactivated successfully.
Sep  4 18:48:58.478181 sshd[2880]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:48:58.814579 sshd[2897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:49:00.109470 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:00.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:00.109470 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:00.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:00.598789 sshd[2880]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:49:01.718045 sshd[2904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:49:03.246443 sshd[2880]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:49:03.413996 sshd[2880]: Received disconnect from 218.92.0.113 port 45322:11:  [preauth]
Sep  4 18:49:03.413996 sshd[2880]: Disconnected from authenticating user root 218.92.0.113 port 45322 [preauth]
Sep  4 18:49:03.415551 systemd[1]: sshd@14-147.75.203.91:22-218.92.0.113:45322.service: Deactivated successfully.
Sep  4 18:49:03.618716 systemd[1]: Started sshd@16-147.75.203.91:22-218.92.0.113:46811.service - OpenSSH per-connection server daemon (218.92.0.113:46811).
Sep  4 18:49:04.935052 sshd[2910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:49:05.109612 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:05.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:05.109612 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:05.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:06.875060 sshd[2908]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:49:07.227835 sshd[2919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:49:09.247629 sshd[2908]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:49:09.600032 sshd[2920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.113  user=root
Sep  4 18:49:10.110827 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:10.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:10.110827 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:10.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:11.560252 sshd[2908]: PAM: Permission denied for root from 218.92.0.113
Sep  4 18:49:11.735590 sshd[2908]: Received disconnect from 218.92.0.113 port 46811:11:  [preauth]
Sep  4 18:49:11.735590 sshd[2908]: Disconnected from authenticating user root 218.92.0.113 port 46811 [preauth]
Sep  4 18:49:11.738992 systemd[1]: sshd@16-147.75.203.91:22-218.92.0.113:46811.service: Deactivated successfully.
Sep  4 18:49:15.111732 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:15.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:15.111732 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:15.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:20.112798 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:20.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:20.112798 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:20.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:25.113213 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:25.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:25.113213 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:25.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:26.992358 systemd[1]: Started sshd@17-147.75.203.91:22-218.92.0.34:44063.service - OpenSSH per-connection server daemon (218.92.0.34:44063).
Sep  4 18:49:29.729230 sshd[2953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:30.113854 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:30.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:30.113854 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:30.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:31.965381 sshd[2951]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:32.266825 sshd[2960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:34.050899 sshd[2951]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:34.350841 sshd[2961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:35.114028 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:35.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:35.114028 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:35.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:36.074768 sshd[2951]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:36.587240 sshd[2951]: Received disconnect from 218.92.0.34 port 44063:11:  [preauth]
Sep  4 18:49:36.587240 sshd[2951]: Disconnected from authenticating user root 218.92.0.34 port 44063 [preauth]
Sep  4 18:49:36.590690 systemd[1]: sshd@17-147.75.203.91:22-218.92.0.34:44063.service: Deactivated successfully.
Sep  4 18:49:36.763433 systemd[1]: Started sshd@18-147.75.203.91:22-218.92.0.34:52622.service - OpenSSH per-connection server daemon (218.92.0.34:52622).
Sep  4 18:49:37.898844 sshd[2973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:39.703121 sshd[2971]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:40.003918 sshd[2974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:40.115013 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:40.114Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:40.115013 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:40.114Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:42.084340 sshd[2971]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:42.383664 sshd[2981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:44.875445 sshd[2971]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:45.024574 sshd[2971]: Received disconnect from 218.92.0.34 port 52622:11:  [preauth]
Sep  4 18:49:45.024574 sshd[2971]: Disconnected from authenticating user root 218.92.0.34 port 52622 [preauth]
Sep  4 18:49:45.027947 systemd[1]: sshd@18-147.75.203.91:22-218.92.0.34:52622.service: Deactivated successfully.
Sep  4 18:49:45.115592 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:45.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:45.115592 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:45.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:45.207662 systemd[1]: Started sshd@19-147.75.203.91:22-218.92.0.34:49671.service - OpenSSH per-connection server daemon (218.92.0.34:49671).
Sep  4 18:49:46.288391 sshd[2995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:48.328782 sshd[2986]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:48.625411 sshd[2996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:50.115848 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:50.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:50.115848 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:50.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:50.605523 sshd[2986]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:50.900498 sshd[2997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34  user=root
Sep  4 18:49:53.155633 sshd[2986]: PAM: Permission denied for root from 218.92.0.34
Sep  4 18:49:53.302185 sshd[2986]: Received disconnect from 218.92.0.34 port 49671:11:  [preauth]
Sep  4 18:49:53.302185 sshd[2986]: Disconnected from authenticating user root 218.92.0.34 port 49671 [preauth]
Sep  4 18:49:53.305614 systemd[1]: sshd@19-147.75.203.91:22-218.92.0.34:49671.service: Deactivated successfully.
Sep  4 18:49:55.116390 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:55.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:49:55.116390 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:49:55.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:00.116506 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:00.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:00.116506 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:00.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:05.117037 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:05.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:05.117037 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:05.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:10.117306 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:10.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:10.117306 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:10.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:15.117600 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:15.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:15.117600 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:15.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:20.117853 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:20.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:20.117853 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:20.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:25.118904 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:25.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:25.118904 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:25.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:30.119749 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:30.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:30.119749 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:30.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:35.120329 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:35.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:35.120329 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:35.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:40.121498 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:40.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:40.121498 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:40.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:45.122561 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:45.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:45.122561 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:45.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:50.122983 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:50.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:50.122983 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:50.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:55.123768 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:55.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:50:55.123768 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:50:55.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:00.123887 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:00.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:00.123887 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:00.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:05.124780 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:05.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:05.124780 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:05.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:10.125461 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:10.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:10.125461 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:10.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:15.125751 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:15.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:15.125751 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:15.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:20.126550 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:20.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:20.126550 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:20.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:25.127348 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:25.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:25.127348 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:25.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:30.128209 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:30.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:30.128209 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:30.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:35.129080 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:35.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:35.129080 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:35.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:40.129670 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:40.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:40.129670 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:40.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:45.130249 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:45.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:45.130249 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:45.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:50.131352 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:50.130Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:50.131352 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:50.130Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:55.132317 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:55.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:51:55.132317 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:51:55.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:00.133625 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:00.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:00.133625 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:00.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:05.134094 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:05.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:05.134094 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:05.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:10.135182 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:10.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:10.135182 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:10.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:11.791992 systemd[1]: Started sshd@20-147.75.203.91:22-61.177.172.160:47737.service - OpenSSH per-connection server daemon (61.177.172.160:47737).
Sep  4 18:52:12.964311 sshd[3185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:15.048363 sshd[3183]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:15.136238 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:15.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:15.136238 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:15.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:15.357849 sshd[3186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:17.854208 sshd[3183]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:18.165191 sshd[3193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:20.136900 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:20.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:20.136900 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:20.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:20.406239 sshd[3183]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:20.560224 sshd[3183]: Received disconnect from 61.177.172.160 port 47737:11:  [preauth]
Sep  4 18:52:20.560224 sshd[3183]: Disconnected from authenticating user root 61.177.172.160 port 47737 [preauth]
Sep  4 18:52:20.563612 systemd[1]: sshd@20-147.75.203.91:22-61.177.172.160:47737.service: Deactivated successfully.
Sep  4 18:52:20.747331 systemd[1]: Started sshd@21-147.75.203.91:22-61.177.172.160:52470.service - OpenSSH per-connection server daemon (61.177.172.160:52470).
Sep  4 18:52:21.925100 sshd[3205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:23.910355 sshd[3197]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:24.223489 sshd[3206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:24.223863 sshd[3206]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked
Sep  4 18:52:25.137909 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:25.137Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:25.137909 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:25.137Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:26.288827 sshd[3197]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:26.602698 sshd[3213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:28.607907 sshd[3197]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:28.763473 sshd[3197]: Received disconnect from 61.177.172.160 port 52470:11:  [preauth]
Sep  4 18:52:28.763473 sshd[3197]: Disconnected from authenticating user root 61.177.172.160 port 52470 [preauth]
Sep  4 18:52:28.764941 systemd[1]: sshd@21-147.75.203.91:22-61.177.172.160:52470.service: Deactivated successfully.
Sep  4 18:52:28.949454 systemd[1]: Started sshd@22-147.75.203.91:22-61.177.172.160:52475.service - OpenSSH per-connection server daemon (61.177.172.160:52475).
Sep  4 18:52:30.129409 sshd[3219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:30.138746 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:30.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:30.138746 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:30.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:32.546090 sshd[3217]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:32.859066 sshd[3226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:35.019518 sshd[3217]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:35.139531 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:35.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:35.139531 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:35.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:35.333448 sshd[3227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.160  user=root
Sep  4 18:52:36.907209 sshd[3217]: PAM: Permission denied for root from 61.177.172.160
Sep  4 18:52:37.063255 sshd[3217]: Received disconnect from 61.177.172.160 port 52475:11:  [preauth]
Sep  4 18:52:37.063255 sshd[3217]: Disconnected from authenticating user root 61.177.172.160 port 52475 [preauth]
Sep  4 18:52:37.066659 systemd[1]: sshd@22-147.75.203.91:22-61.177.172.160:52475.service: Deactivated successfully.
Sep  4 18:52:40.140013 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:40.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:40.140013 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:40.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:45.141020 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:45.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:45.141020 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:45.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:50.141841 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:50.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:50.141841 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:50.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:55.142927 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:55.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:52:55.142927 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:52:55.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:00.143850 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:00.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:00.143850 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:00.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:05.144093 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:05.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:05.144093 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:05.143Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:10.145243 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:10.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:10.145243 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:10.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:11.179667 systemd[1]: Started sshd@23-147.75.203.91:22-47.155.193.65:60447.service - OpenSSH per-connection server daemon (47.155.193.65:60447).
Sep  4 18:53:12.808457 sshd[3281]: Invalid user default from 47.155.193.65 port 60447
Sep  4 18:53:13.267603 sshd[3287]: pam_faillock(sshd:auth): User unknown
Sep  4 18:53:13.271958 sshd[3281]: Postponed keyboard-interactive for invalid user default from 47.155.193.65 port 60447 ssh2 [preauth]
Sep  4 18:53:13.745935 sshd[3287]: pam_unix(sshd:auth): check pass; user unknown
Sep  4 18:53:13.746059 sshd[3287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.155.193.65
Sep  4 18:53:13.747289 sshd[3287]: pam_faillock(sshd:auth): User unknown
Sep  4 18:53:15.145619 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:15.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:15.145619 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:15.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:15.536365 sshd[3281]: PAM: Permission denied for illegal user default from 47.155.193.65
Sep  4 18:53:15.536832 sshd[3281]: Failed keyboard-interactive/pam for invalid user default from 47.155.193.65 port 60447 ssh2
Sep  4 18:53:15.755926 sshd[3281]: Connection closed by invalid user default 47.155.193.65 port 60447 [preauth]
Sep  4 18:53:15.759414 systemd[1]: sshd@23-147.75.203.91:22-47.155.193.65:60447.service: Deactivated successfully.
Sep  4 18:53:20.146511 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:20.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:20.146511 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:20.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:25.146642 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:25.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:25.146642 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:25.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:30.147109 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:30.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:30.147109 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:30.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:35.147175 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:35.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:35.147175 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:35.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:40.147929 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:40.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:40.147929 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:40.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:45.149098 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:45.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:45.149098 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:45.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:50.149522 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:50.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:50.149522 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:50.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:55.150228 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:55.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:53:55.150228 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:53:55.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:00.150965 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:00.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:00.150965 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:00.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:05.152087 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:05.151Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:05.152087 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:05.151Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:10.152825 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:10.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:10.152825 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:10.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:15.154033 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:15.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:15.154033 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:15.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:20.154994 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:20.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:20.154994 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:20.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:25.155736 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:25.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:25.155736 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:25.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:30.156170 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:30.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:30.156170 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:30.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:35.156848 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:35.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:35.156848 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:35.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:40.157838 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:40.157Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:40.157838 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:40.157Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:43.221367 update_engine[1451]: I0904 18:54:43.221248  1451 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs
Sep  4 18:54:43.221367 update_engine[1451]: I0904 18:54:43.221331  1451 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs
Sep  4 18:54:43.222292 update_engine[1451]: I0904 18:54:43.221693  1451 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs
Sep  4 18:54:43.222803 update_engine[1451]: I0904 18:54:43.222729  1451 omaha_request_params.cc:62] Current group set to stable
Sep  4 18:54:43.222974 update_engine[1451]: I0904 18:54:43.222955  1451 update_attempter.cc:499] Already updated boot flags. Skipping.
Sep  4 18:54:43.222974 update_engine[1451]: I0904 18:54:43.222971  1451 update_attempter.cc:643] Scheduling an action processor start.
Sep  4 18:54:43.223171 update_engine[1451]: I0904 18:54:43.223002  1451 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction
Sep  4 18:54:43.223171 update_engine[1451]: I0904 18:54:43.223070  1451 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs
Sep  4 18:54:43.223349 update_engine[1451]: I0904 18:54:43.223248  1451 omaha_request_action.cc:271] Posting an Omaha request to disabled
Sep  4 18:54:43.223349 update_engine[1451]: I0904 18:54:43.223268  1451 omaha_request_action.cc:272] Request: <?xml version="1.0" encoding="UTF-8"?>
Sep  4 18:54:43.223349 update_engine[1451]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1">
Sep  4 18:54:43.223349 update_engine[1451]:     <os version="Chateau" platform="CoreOS" sp="3975.2.1_x86_64"></os>
Sep  4 18:54:43.223349 update_engine[1451]:     <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3975.2.1" track="stable" bootid="{087ba0df-7c71-4c93-912b-4bd0e131cf20}" oem="packet" oemversion="0.2.2-r2" alephversion="3975.2.1" machineid="46156ced210545c5a9b2eedd777b9f3f" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" >
Sep  4 18:54:43.223349 update_engine[1451]:         <ping active="1"></ping>
Sep  4 18:54:43.223349 update_engine[1451]:         <updatecheck></updatecheck>
Sep  4 18:54:43.223349 update_engine[1451]:         <event eventtype="3" eventresult="2" previousversion="0.0.0.0"></event>
Sep  4 18:54:43.223349 update_engine[1451]:     </app>
Sep  4 18:54:43.223349 update_engine[1451]: </request>
Sep  4 18:54:43.223349 update_engine[1451]: I0904 18:54:43.223278  1451 libcurl_http_fetcher.cc:47] Starting/Resuming transfer
Sep  4 18:54:43.224240 locksmithd[1482]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0
Sep  4 18:54:43.225917 update_engine[1451]: I0904 18:54:43.225883  1451 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP
Sep  4 18:54:43.226085 update_engine[1451]: I0904 18:54:43.226059  1451 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds.
Sep  4 18:54:43.286465 update_engine[1451]: E0904 18:54:43.286397  1451 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled
Sep  4 18:54:43.286595 update_engine[1451]: I0904 18:54:43.286477  1451 libcurl_http_fetcher.cc:283] No HTTP response, retry 1
Sep  4 18:54:45.158613 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:45.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:45.158613 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:45.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:45.511523 systemd[1]: Started sshd@24-147.75.203.91:22-193.32.162.38:51932.service - OpenSSH per-connection server daemon (193.32.162.38:51932).
Sep  4 18:54:46.226562 sshd[3400]: Invalid user pyimagesearch from 193.32.162.38 port 51932
Sep  4 18:54:46.405199 sshd[3400]: Connection closed by invalid user pyimagesearch 193.32.162.38 port 51932 [preauth]
Sep  4 18:54:46.408332 systemd[1]: sshd@24-147.75.203.91:22-193.32.162.38:51932.service: Deactivated successfully.
Sep  4 18:54:50.159307 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:50.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:50.159307 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:50.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:53.130567 update_engine[1451]: I0904 18:54:53.130443  1451 libcurl_http_fetcher.cc:47] Starting/Resuming transfer
Sep  4 18:54:53.131404 update_engine[1451]: I0904 18:54:53.130856  1451 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP
Sep  4 18:54:53.131404 update_engine[1451]: I0904 18:54:53.131352  1451 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds.
Sep  4 18:54:53.143790 update_engine[1451]: E0904 18:54:53.143690  1451 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled
Sep  4 18:54:53.144060 update_engine[1451]: I0904 18:54:53.143823  1451 libcurl_http_fetcher.cc:283] No HTTP response, retry 2
Sep  4 18:54:55.159126 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:55.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:54:55.159126 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:54:55.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:00.160181 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:00.159Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:00.160181 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:00.159Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:03.131200 update_engine[1451]: I0904 18:55:03.131076  1451 libcurl_http_fetcher.cc:47] Starting/Resuming transfer
Sep  4 18:55:03.132106 update_engine[1451]: I0904 18:55:03.131520  1451 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP
Sep  4 18:55:03.132106 update_engine[1451]: I0904 18:55:03.131982  1451 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds.
Sep  4 18:55:03.132956 update_engine[1451]: E0904 18:55:03.132866  1451 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled
Sep  4 18:55:03.133136 update_engine[1451]: I0904 18:55:03.132980  1451 libcurl_http_fetcher.cc:283] No HTTP response, retry 3
Sep  4 18:55:05.160579 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:05.159Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:05.160579 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:05.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:10.160702 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:10.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:10.160702 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:10.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:13.131442 update_engine[1451]: I0904 18:55:13.131318  1451 libcurl_http_fetcher.cc:47] Starting/Resuming transfer
Sep  4 18:55:13.132304 update_engine[1451]: I0904 18:55:13.131732  1451 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP
Sep  4 18:55:13.132304 update_engine[1451]: I0904 18:55:13.132230  1451 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds.
Sep  4 18:55:13.133091 update_engine[1451]: E0904 18:55:13.133005  1451 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled
Sep  4 18:55:13.133327 update_engine[1451]: I0904 18:55:13.133116  1451 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded
Sep  4 18:55:13.133327 update_engine[1451]: I0904 18:55:13.133133  1451 omaha_request_action.cc:617] Omaha request response:
Sep  4 18:55:13.133327 update_engine[1451]: E0904 18:55:13.133317  1451 omaha_request_action.cc:636] Omaha request network transfer failed.
Sep  4 18:55:13.133604 update_engine[1451]: I0904 18:55:13.133358  1451 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing.
Sep  4 18:55:13.133604 update_engine[1451]: I0904 18:55:13.133368  1451 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction
Sep  4 18:55:13.133604 update_engine[1451]: I0904 18:55:13.133375  1451 update_attempter.cc:306] Processing Done.
Sep  4 18:55:13.133604 update_engine[1451]: E0904 18:55:13.133404  1451 update_attempter.cc:619] Update failed.
Sep  4 18:55:13.133604 update_engine[1451]: I0904 18:55:13.133412  1451 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse
Sep  4 18:55:13.133604 update_engine[1451]: I0904 18:55:13.133421  1451 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse)
Sep  4 18:55:13.133604 update_engine[1451]: I0904 18:55:13.133430  1451 payload_state.cc:103] Ignoring failures until we get a valid Omaha response.
Sep  4 18:55:13.133604 update_engine[1451]: I0904 18:55:13.133577  1451 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction
Sep  4 18:55:13.134286 update_engine[1451]: I0904 18:55:13.133625  1451 omaha_request_action.cc:271] Posting an Omaha request to disabled
Sep  4 18:55:13.134286 update_engine[1451]: I0904 18:55:13.133634  1451 omaha_request_action.cc:272] Request: <?xml version="1.0" encoding="UTF-8"?>
Sep  4 18:55:13.134286 update_engine[1451]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1">
Sep  4 18:55:13.134286 update_engine[1451]:     <os version="Chateau" platform="CoreOS" sp="3975.2.1_x86_64"></os>
Sep  4 18:55:13.134286 update_engine[1451]:     <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3975.2.1" track="stable" bootid="{087ba0df-7c71-4c93-912b-4bd0e131cf20}" oem="packet" oemversion="0.2.2-r2" alephversion="3975.2.1" machineid="46156ced210545c5a9b2eedd777b9f3f" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" >
Sep  4 18:55:13.134286 update_engine[1451]:         <event eventtype="3" eventresult="0" errorcode="268437456"></event>
Sep  4 18:55:13.134286 update_engine[1451]:     </app>
Sep  4 18:55:13.134286 update_engine[1451]: </request>
Sep  4 18:55:13.134286 update_engine[1451]: I0904 18:55:13.133644  1451 libcurl_http_fetcher.cc:47] Starting/Resuming transfer
Sep  4 18:55:13.134286 update_engine[1451]: I0904 18:55:13.133932  1451 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP
Sep  4 18:55:13.135074 locksmithd[1482]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0
Sep  4 18:55:13.135715 update_engine[1451]: I0904 18:55:13.134351  1451 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds.
Sep  4 18:55:13.135715 update_engine[1451]: E0904 18:55:13.135082  1451 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled
Sep  4 18:55:13.135715 update_engine[1451]: I0904 18:55:13.135203  1451 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded
Sep  4 18:55:13.135715 update_engine[1451]: I0904 18:55:13.135219  1451 omaha_request_action.cc:617] Omaha request response:
Sep  4 18:55:13.135715 update_engine[1451]: I0904 18:55:13.135231  1451 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction
Sep  4 18:55:13.135715 update_engine[1451]: I0904 18:55:13.135238  1451 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction
Sep  4 18:55:13.135715 update_engine[1451]: I0904 18:55:13.135246  1451 update_attempter.cc:306] Processing Done.
Sep  4 18:55:13.135715 update_engine[1451]: I0904 18:55:13.135257  1451 update_attempter.cc:310] Error event sent.
Sep  4 18:55:13.135715 update_engine[1451]: I0904 18:55:13.135270  1451 update_check_scheduler.cc:74] Next update check in 43m9s
Sep  4 18:55:13.136500 locksmithd[1482]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0
Sep  4 18:55:15.161876 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:15.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:15.161876 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:15.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:20.162546 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:20.162Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:20.162546 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:20.162Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:25.163868 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:25.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:25.163868 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:25.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:30.164796 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:30.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:30.164796 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:30.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:35.165487 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:35.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:35.165487 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:35.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:40.165964 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:40.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:40.165964 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:40.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:45.166793 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:45.166Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:45.166793 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:45.166Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:50.167573 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:50.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:50.167573 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:50.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:55.168313 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:55.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:55:55.168313 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:55:55.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:00.168907 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:00.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:00.168907 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:00.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:05.169895 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:05.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:05.169895 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:05.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:10.170966 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:10.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:10.170966 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:10.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:15.172079 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:15.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:15.172079 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:15.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:20.173079 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:20.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:20.173079 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:20.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:25.173851 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:25.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:25.173851 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:25.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:30.174982 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:30.174Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:30.174982 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:30.174Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:35.175796 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:35.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:35.175796 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:35.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:40.176040 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:40.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:40.176040 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:40.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:45.176286 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:45.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:45.176286 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:45.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:50.177519 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:50.176Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:50.177519 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:50.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:55.177959 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:55.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:56:55.177959 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:56:55.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:00.178828 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:00.178Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:00.178828 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:00.178Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:05.179680 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:05.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:05.179680 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:05.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:10.179637 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:10.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:10.179637 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:10.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:15.180864 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:15.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:15.180864 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:15.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:20.182064 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:20.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:20.182064 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:20.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:25.183063 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:25.182Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:25.183063 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:25.182Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:30.183649 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:30.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:30.183649 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:30.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:35.184261 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:35.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:35.184261 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:35.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:40.185364 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:40.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:40.185364 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:40.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:45.185843 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:45.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:45.185843 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:45.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:50.186564 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:50.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:50.186564 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:50.186Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:55.186908 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:55.186Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:57:55.186908 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:57:55.186Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:00.187947 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:00.187Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:00.187947 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:00.187Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:05.189118 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:05.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:05.189118 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:05.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:10.189712 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:10.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:10.189712 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:10.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:15.190010 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:15.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:15.190010 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:15.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:20.190889 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:20.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:20.190889 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:20.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:25.191688 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:25.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:25.191688 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:25.191Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:30.191984 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:30.191Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:30.191984 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:30.191Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:35.192398 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:35.191Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:35.192398 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:35.191Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:40.193324 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:40.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:40.193324 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:40.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:45.194284 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:45.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:45.194284 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:45.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:50.195386 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:50.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:50.195386 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:50.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:55.195986 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:55.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:58:55.195986 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:58:55.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:00.196737 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:00.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:00.196737 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:00.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:05.197773 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:05.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:05.197773 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:05.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:10.198294 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:10.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:10.198294 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:10.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:15.198782 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:15.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:15.198782 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:15.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:20.199535 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:20.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:20.199535 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:20.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:25.200541 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:25.199Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:25.200541 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:25.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:30.200860 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:30.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:30.200860 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:30.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:35.201982 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:35.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:35.201982 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:35.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:40.203181 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:40.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:40.203181 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:40.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:45.203646 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:45.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:45.203646 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:45.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:45.574446 systemd[1]: Started sshd@25-147.75.203.91:22-218.92.0.56:30044.service - OpenSSH per-connection server daemon (218.92.0.56:30044).
Sep  4 18:59:47.179104 sshd[3780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 18:59:48.922618 sshd[3776]: PAM: Permission denied for root from 218.92.0.56
Sep  4 18:59:49.252808 sshd[3785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 18:59:50.204298 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:50.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:50.204298 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:50.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 18:59:51.408301 sshd[3776]: PAM: Permission denied for root from 218.92.0.56
Sep  4 18:59:51.739055 sshd[3788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 18:59:53.834495 sshd[3776]: PAM: Permission denied for root from 218.92.0.56
Sep  4 18:59:53.998097 sshd[3776]: Received disconnect from 218.92.0.56 port 30044:11:  [preauth]
Sep  4 18:59:53.998097 sshd[3776]: Disconnected from authenticating user root 218.92.0.56 port 30044 [preauth]
Sep  4 18:59:54.001499 systemd[1]: sshd@25-147.75.203.91:22-218.92.0.56:30044.service: Deactivated successfully.
Sep  4 18:59:54.270471 systemd[1]: Started sshd@26-147.75.203.91:22-218.92.0.56:22807.service - OpenSSH per-connection server daemon (218.92.0.56:22807).
Sep  4 18:59:55.205059 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:55.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:55.205059 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T18:59:55.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 18:59:57.831851 sshd[3805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 18:59:59.751724 sshd[3797]: PAM: Permission denied for root from 218.92.0.56
Sep  4 19:00:00.206067 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:00.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:00.206067 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:00.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:00.618445 sshd[3806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 19:00:00.618822 sshd[3806]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked
Sep  4 19:00:02.478049 sshd[3797]: PAM: Permission denied for root from 218.92.0.56
Sep  4 19:00:03.323989 sshd[3813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 19:00:05.206429 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:05.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:05.206429 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:05.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:05.595313 sshd[3797]: PAM: Permission denied for root from 218.92.0.56
Sep  4 19:00:05.797696 sshd[3797]: Received disconnect from 218.92.0.56 port 22807:11:  [preauth]
Sep  4 19:00:05.797696 sshd[3797]: Disconnected from authenticating user root 218.92.0.56 port 22807 [preauth]
Sep  4 19:00:05.801049 systemd[1]: sshd@26-147.75.203.91:22-218.92.0.56:22807.service: Deactivated successfully.
Sep  4 19:00:06.949538 systemd[1]: Started sshd@27-147.75.203.91:22-218.92.0.56:34038.service - OpenSSH per-connection server daemon (218.92.0.56:34038).
Sep  4 19:00:09.665337 sshd[3825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 19:00:10.207292 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:10.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:10.207292 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:10.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:11.564858 sshd[3819]: PAM: Permission denied for root from 218.92.0.56
Sep  4 19:00:11.897037 sshd[3828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 19:00:13.405395 sshd[3819]: PAM: Permission denied for root from 218.92.0.56
Sep  4 19:00:13.742031 sshd[3833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56  user=root
Sep  4 19:00:15.208201 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:15.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:15.208201 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:15.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:00:15.857314 sshd[3819]: PAM: Permission denied for root from 218.92.0.56
Sep  4 19:00:16.023841 sshd[3819]: Received disconnect from 218.92.0.56 port 34038:11:  [preauth]
Sep  4 19:00:16.023841 sshd[3819]: Disconnected from authenticating user root 218.92.0.56 port 34038 [preauth]
Sep  4 19:00:16.027300 systemd[1]: sshd@27-147.75.203.91:22-218.92.0.56:34038.service: Deactivated successfully.
Sep  4 19:00:20.208512 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:20.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:20.208512 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:20.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:25.209781 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:25.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:00:25.209781 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:25.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:00:29.176448 systemd[1]: Started sshd@28-147.75.203.91:22-61.177.172.136:43736.service - OpenSSH per-connection server daemon (61.177.172.136:43736).
Sep  4 19:00:30.209792 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:30.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:00:30.209792 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:30.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:30.418998 sshd[3857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:32.202691 sshd[3855]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:32.542913 sshd[3864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:34.267028 sshd[3855]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:34.607912 sshd[3865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:35.210102 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:35.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:35.210102 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:35.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:35.214507 systemd[1]: Started sshd@29-147.75.203.91:22-193.32.162.38:46330.service - OpenSSH per-connection server daemon (193.32.162.38:46330).
Sep  4 19:00:35.930712 sshd[3867]: Invalid user support from 193.32.162.38 port 46330
Sep  4 19:00:36.107188 sshd[3867]: Connection closed by invalid user support 193.32.162.38 port 46330 [preauth]
Sep  4 19:00:36.110299 systemd[1]: sshd@29-147.75.203.91:22-193.32.162.38:46330.service: Deactivated successfully.
Sep  4 19:00:36.272177 sshd[3855]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:36.436466 sshd[3855]: Received disconnect from 61.177.172.136 port 43736:11:  [preauth]
Sep  4 19:00:36.436466 sshd[3855]: Disconnected from authenticating user root 61.177.172.136 port 43736 [preauth]
Sep  4 19:00:36.439975 systemd[1]: sshd@28-147.75.203.91:22-61.177.172.136:43736.service: Deactivated successfully.
Sep  4 19:00:36.618419 systemd[1]: Started sshd@30-147.75.203.91:22-61.177.172.136:34525.service - OpenSSH per-connection server daemon (61.177.172.136:34525).
Sep  4 19:00:37.868562 sshd[3883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:40.211619 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:40.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:00:40.211619 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:40.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:40.610765 sshd[3877]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:40.933373 sshd[3884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:42.757783 sshd[3877]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:43.081464 systemd[1]: Started sshd@31-147.75.203.91:22-218.92.0.112:45173.service - OpenSSH per-connection server daemon (218.92.0.112:45173).
Sep  4 19:00:43.089634 sshd[3891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:44.244460 sshd[3895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112  user=root
Sep  4 19:00:44.852524 sshd[3877]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:45.015432 sshd[3877]: Received disconnect from 61.177.172.136 port 34525:11:  [preauth]
Sep  4 19:00:45.015432 sshd[3877]: Disconnected from authenticating user root 61.177.172.136 port 34525 [preauth]
Sep  4 19:00:45.018807 systemd[1]: sshd@30-147.75.203.91:22-61.177.172.136:34525.service: Deactivated successfully.
Sep  4 19:00:45.200733 systemd[1]: Started sshd@32-147.75.203.91:22-61.177.172.136:35514.service - OpenSSH per-connection server daemon (61.177.172.136:35514).
Sep  4 19:00:45.211734 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:45.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:45.211734 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:45.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:45.948622 sshd[3893]: PAM: Permission denied for root from 218.92.0.112
Sep  4 19:00:46.257726 sshd[3902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112  user=root
Sep  4 19:00:46.441857 sshd[3903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:48.237865 sshd[3893]: PAM: Permission denied for root from 218.92.0.112
Sep  4 19:00:48.422059 sshd[3900]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:48.546666 sshd[3910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112  user=root
Sep  4 19:00:48.750933 sshd[3911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:50.212864 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:50.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:50.212864 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:50.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:00:50.466604 sshd[3893]: PAM: Permission denied for root from 218.92.0.112
Sep  4 19:00:50.619899 sshd[3893]: Received disconnect from 218.92.0.112 port 45173:11:  [preauth]
Sep  4 19:00:50.619899 sshd[3893]: Disconnected from authenticating user root 218.92.0.112 port 45173 [preauth]
Sep  4 19:00:50.623378 systemd[1]: sshd@31-147.75.203.91:22-218.92.0.112:45173.service: Deactivated successfully.
Sep  4 19:00:50.670598 sshd[3900]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:50.802460 systemd[1]: Started sshd@33-147.75.203.91:22-218.92.0.112:42048.service - OpenSSH per-connection server daemon (218.92.0.112:42048).
Sep  4 19:00:51.002870 sshd[3917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136  user=root
Sep  4 19:00:51.968282 sshd[3920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112  user=root
Sep  4 19:00:52.862841 sshd[3900]: PAM: Permission denied for root from 61.177.172.136
Sep  4 19:00:53.016772 sshd[3900]: Received disconnect from 61.177.172.136 port 35514:11:  [preauth]
Sep  4 19:00:53.016772 sshd[3900]: Disconnected from authenticating user root 61.177.172.136 port 35514 [preauth]
Sep  4 19:00:53.021617 systemd[1]: sshd@32-147.75.203.91:22-61.177.172.136:35514.service: Deactivated successfully.
Sep  4 19:00:53.968445 sshd[3915]: PAM: Permission denied for root from 218.92.0.112
Sep  4 19:00:54.278521 sshd[3928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112  user=root
Sep  4 19:00:55.212662 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:55.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:00:55.212662 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:00:55.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:00:56.022809 sshd[3915]: PAM: Permission denied for root from 218.92.0.112
Sep  4 19:00:56.332879 sshd[3929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112  user=root
Sep  4 19:00:58.016419 sshd[3915]: PAM: Permission denied for root from 218.92.0.112
Sep  4 19:00:58.170438 sshd[3915]: Received disconnect from 218.92.0.112 port 42048:11:  [preauth]
Sep  4 19:00:58.170438 sshd[3915]: Disconnected from authenticating user root 218.92.0.112 port 42048 [preauth]
Sep  4 19:00:58.173883 systemd[1]: sshd@33-147.75.203.91:22-218.92.0.112:42048.service: Deactivated successfully.
Sep  4 19:00:58.357436 systemd[1]: Started sshd@34-147.75.203.91:22-218.92.0.112:36971.service - OpenSSH per-connection server daemon (218.92.0.112:36971).
Sep  4 19:00:59.496511 systemd[1]: Started sshd@35-147.75.203.91:22-183.101.18.237:63151.service - OpenSSH per-connection server daemon (183.101.18.237:63151).
Sep  4 19:00:59.533088 sshd[3941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112  user=root
Sep  4 19:01:00.213677 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:00.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:00.213677 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:00.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:00.532531 sshd[3943]: Invalid user user from 183.101.18.237 port 63151
Sep  4 19:01:01.297187 sshd[3939]: PAM: Permission denied for root from 218.92.0.112
Sep  4 19:01:01.446853 sshd[3943]: Connection closed by invalid user user 183.101.18.237 port 63151 [preauth]
Sep  4 19:01:01.449988 systemd[1]: sshd@35-147.75.203.91:22-183.101.18.237:63151.service: Deactivated successfully.
Sep  4 19:01:01.608928 sshd[3946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112  user=root
Sep  4 19:01:03.980659 sshd[3939]: PAM: Permission denied for root from 218.92.0.112
Sep  4 19:01:03.981768 sshd[3939]: Connection closed by authenticating user root 218.92.0.112 port 36971 [preauth]
Sep  4 19:01:03.985122 systemd[1]: sshd@34-147.75.203.91:22-218.92.0.112:36971.service: Deactivated successfully.
Sep  4 19:01:05.214662 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:05.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:05.214662 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:05.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:10.215031 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:10.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:01:10.215031 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:10.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:01:15.215434 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:15.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:15.215434 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:15.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:20.215640 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:20.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:20.215640 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:20.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:25.216330 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:25.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:01:25.216330 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:25.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:01:30.217524 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:30.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:30.217524 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:30.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:35.218502 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:35.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:35.218502 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:35.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:01:40.219735 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:40.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:40.219735 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:40.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:45.220453 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:45.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:45.220453 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:45.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:01:50.221393 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:50.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:01:50.221393 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:50.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:01:55.222654 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:55.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:01:55.222654 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:01:55.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:02:00.223688 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:00.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:02:00.223688 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:00.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:02:05.224885 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:05.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:02:05.224885 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:05.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: no route to host"}
Sep  4 19:02:10.226104 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:10.225Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:02:10.226104 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:10.225Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:02:15.227310 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:15.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:15.227310 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:15.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:20.228251 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:20.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:20.228251 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:20.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:25.228497 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:25.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:25.228497 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:25.227Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:27.525790 flannel-wrapper[2656]: I0904 19:02:27.525505       1 udp_network_amd64.go:196] Subnet added: 10.254.51.0/24
Sep  4 19:02:30.228873 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:30.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:30.228873 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:30.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:35.229289 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:35.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:35.229289 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:35.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:39.064511 systemd[1]: Started sshd@36-147.75.203.91:22-139.178.89.65:60042.service - OpenSSH per-connection server daemon (139.178.89.65:60042).
Sep  4 19:02:39.091875 sshd[4071]: Accepted publickey for core from 139.178.89.65 port 60042 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:02:39.092644 sshd[4071]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:02:39.095772 systemd-logind[1446]: New session 13 of user core.
Sep  4 19:02:39.107353 systemd[1]: Started session-13.scope - Session 13 of User core.
Sep  4 19:02:40.229772 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:40.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:40.229772 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:40.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: connect: connection refused"}
Sep  4 19:02:44.173072 sshd[4071]: pam_unix(sshd:session): session closed for user core
Sep  4 19:02:44.179571 systemd[1]: sshd@36-147.75.203.91:22-139.178.89.65:60042.service: Deactivated successfully.
Sep  4 19:02:44.183303 systemd[1]: session-13.scope: Deactivated successfully.
Sep  4 19:02:44.184612 systemd-logind[1446]: Session 13 logged out. Waiting for processes to exit.
Sep  4 19:02:44.199523 systemd[1]: Starting systemd-tmpfiles-clean.service - Cleanup of Temporary Directories...
Sep  4 19:02:44.200226 systemd-logind[1446]: Removed session 13.
Sep  4 19:02:44.208548 systemd-tmpfiles[4095]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Sep  4 19:02:44.208815 systemd-tmpfiles[4095]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring.
Sep  4 19:02:44.209318 systemd-tmpfiles[4095]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Sep  4 19:02:44.209489 systemd-tmpfiles[4095]: ACLs are not supported, ignoring.
Sep  4 19:02:44.209538 systemd-tmpfiles[4095]: ACLs are not supported, ignoring.
Sep  4 19:02:44.219611 systemd-tmpfiles[4095]: Detected autofs mount point /boot during canonicalization of boot.
Sep  4 19:02:44.219632 systemd-tmpfiles[4095]: Skipping /boot
Sep  4 19:02:44.232821 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully.
Sep  4 19:02:44.233333 systemd[1]: Finished systemd-tmpfiles-clean.service - Cleanup of Temporary Directories.
Sep  4 19:02:45.230798 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:45.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:02:45.230798 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:45.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:02:50.231948 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:50.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:02:50.231948 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:50.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:02:54.190033 systemd[1]: Started sshd@37-147.75.203.91:22-139.178.89.65:58528.service - OpenSSH per-connection server daemon (139.178.89.65:58528).
Sep  4 19:02:54.217684 sshd[4111]: Accepted publickey for core from 139.178.89.65 port 58528 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:02:54.218424 sshd[4111]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:02:54.221353 systemd-logind[1446]: New session 14 of user core.
Sep  4 19:02:54.241472 systemd[1]: Started session-14.scope - Session 14 of User core.
Sep  4 19:02:55.232346 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:55.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:02:55.232346 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:02:55.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:02:59.316784 sshd[4111]: pam_unix(sshd:session): session closed for user core
Sep  4 19:02:59.324756 systemd[1]: sshd@37-147.75.203.91:22-139.178.89.65:58528.service: Deactivated successfully.
Sep  4 19:02:59.328194 systemd[1]: session-14.scope: Deactivated successfully.
Sep  4 19:02:59.328665 systemd-logind[1446]: Session 14 logged out. Waiting for processes to exit.
Sep  4 19:02:59.329142 systemd-logind[1446]: Removed session 14.
Sep  4 19:03:00.232462 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:00.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:00.232462 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:00.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:05.233917 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:05.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:05.233917 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:05.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:09.339437 systemd[1]: Started sshd@38-147.75.203.91:22-139.178.89.65:60064.service - OpenSSH per-connection server daemon (139.178.89.65:60064).
Sep  4 19:03:09.364715 sshd[4145]: Accepted publickey for core from 139.178.89.65 port 60064 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:03:09.365705 sshd[4145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:03:09.369169 systemd-logind[1446]: New session 15 of user core.
Sep  4 19:03:09.385495 systemd[1]: Started session-15.scope - Session 15 of User core.
Sep  4 19:03:10.235189 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:10.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:10.235189 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:10.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:14.450519 sshd[4145]: pam_unix(sshd:session): session closed for user core
Sep  4 19:03:14.458571 systemd[1]: sshd@38-147.75.203.91:22-139.178.89.65:60064.service: Deactivated successfully.
Sep  4 19:03:14.461972 systemd[1]: session-15.scope: Deactivated successfully.
Sep  4 19:03:14.462431 systemd-logind[1446]: Session 15 logged out. Waiting for processes to exit.
Sep  4 19:03:14.463060 systemd-logind[1446]: Removed session 15.
Sep  4 19:03:15.235480 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:15.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:15.235480 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:15.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:20.235762 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:20.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:20.235762 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:20.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:24.481449 systemd[1]: Started sshd@39-147.75.203.91:22-139.178.89.65:48384.service - OpenSSH per-connection server daemon (139.178.89.65:48384).
Sep  4 19:03:24.507125 sshd[4181]: Accepted publickey for core from 139.178.89.65 port 48384 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:03:24.508055 sshd[4181]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:03:24.511829 systemd-logind[1446]: New session 16 of user core.
Sep  4 19:03:24.522430 systemd[1]: Started session-16.scope - Session 16 of User core.
Sep  4 19:03:25.236268 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:25.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:25.236268 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:25.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:29.592546 sshd[4181]: pam_unix(sshd:session): session closed for user core
Sep  4 19:03:29.598985 systemd[1]: sshd@39-147.75.203.91:22-139.178.89.65:48384.service: Deactivated successfully.
Sep  4 19:03:29.602883 systemd[1]: session-16.scope: Deactivated successfully.
Sep  4 19:03:29.604510 systemd-logind[1446]: Session 16 logged out. Waiting for processes to exit.
Sep  4 19:03:29.605085 systemd-logind[1446]: Removed session 16.
Sep  4 19:03:30.236802 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:30.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:30.236802 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:30.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:35.236963 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:35.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:35.236963 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:35.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:39.626528 systemd[1]: Started sshd@40-147.75.203.91:22-139.178.89.65:49670.service - OpenSSH per-connection server daemon (139.178.89.65:49670).
Sep  4 19:03:39.652539 sshd[4223]: Accepted publickey for core from 139.178.89.65 port 49670 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:03:39.653264 sshd[4223]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:03:39.656457 systemd-logind[1446]: New session 17 of user core.
Sep  4 19:03:39.665384 systemd[1]: Started session-17.scope - Session 17 of User core.
Sep  4 19:03:40.237747 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:40.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:40.237747 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:40.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:44.732431 sshd[4223]: pam_unix(sshd:session): session closed for user core
Sep  4 19:03:44.738857 systemd[1]: sshd@40-147.75.203.91:22-139.178.89.65:49670.service: Deactivated successfully.
Sep  4 19:03:44.742661 systemd[1]: session-17.scope: Deactivated successfully.
Sep  4 19:03:44.744507 systemd-logind[1446]: Session 17 logged out. Waiting for processes to exit.
Sep  4 19:03:44.745128 systemd-logind[1446]: Removed session 17.
Sep  4 19:03:45.238032 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:45.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:45.238032 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:45.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:50.238733 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:50.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:50.238733 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:50.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:54.756443 systemd[1]: Started sshd@41-147.75.203.91:22-139.178.89.65:35094.service - OpenSSH per-connection server daemon (139.178.89.65:35094).
Sep  4 19:03:54.781629 sshd[4261]: Accepted publickey for core from 139.178.89.65 port 35094 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:03:54.782566 sshd[4261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:03:54.786025 systemd-logind[1446]: New session 18 of user core.
Sep  4 19:03:54.795395 systemd[1]: Started session-18.scope - Session 18 of User core.
Sep  4 19:03:55.239593 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:55.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:55.239593 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:03:55.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:03:59.861048 sshd[4261]: pam_unix(sshd:session): session closed for user core
Sep  4 19:03:59.864739 systemd[1]: sshd@41-147.75.203.91:22-139.178.89.65:35094.service: Deactivated successfully.
Sep  4 19:03:59.867244 systemd[1]: session-18.scope: Deactivated successfully.
Sep  4 19:03:59.869576 systemd-logind[1446]: Session 18 logged out. Waiting for processes to exit.
Sep  4 19:03:59.871785 systemd-logind[1446]: Removed session 18.
Sep  4 19:04:00.240457 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:00.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:00.240457 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:00.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:05.241492 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:05.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:05.241492 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:05.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:09.884424 systemd[1]: Started sshd@42-147.75.203.91:22-139.178.89.65:57166.service - OpenSSH per-connection server daemon (139.178.89.65:57166).
Sep  4 19:04:09.910779 sshd[4299]: Accepted publickey for core from 139.178.89.65 port 57166 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:04:09.914005 sshd[4299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:04:09.925218 systemd-logind[1446]: New session 19 of user core.
Sep  4 19:04:09.935623 systemd[1]: Started session-19.scope - Session 19 of User core.
Sep  4 19:04:10.241739 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:10.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:10.241739 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:10.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:15.008890 sshd[4299]: pam_unix(sshd:session): session closed for user core
Sep  4 19:04:15.015322 systemd[1]: sshd@42-147.75.203.91:22-139.178.89.65:57166.service: Deactivated successfully.
Sep  4 19:04:15.019094 systemd[1]: session-19.scope: Deactivated successfully.
Sep  4 19:04:15.020406 systemd-logind[1446]: Session 19 logged out. Waiting for processes to exit.
Sep  4 19:04:15.021193 systemd-logind[1446]: Removed session 19.
Sep  4 19:04:15.242275 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:15.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:15.242275 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:15.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:20.243173 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:20.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:20.243173 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:20.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:25.024663 systemd[1]: Started sshd@43-147.75.203.91:22-139.178.89.65:34524.service - OpenSSH per-connection server daemon (139.178.89.65:34524).
Sep  4 19:04:25.052975 sshd[4339]: Accepted publickey for core from 139.178.89.65 port 34524 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:04:25.056187 sshd[4339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:04:25.067223 systemd-logind[1446]: New session 20 of user core.
Sep  4 19:04:25.077585 systemd[1]: Started session-20.scope - Session 20 of User core.
Sep  4 19:04:25.244100 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:25.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:25.244100 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:25.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:30.151083 sshd[4339]: pam_unix(sshd:session): session closed for user core
Sep  4 19:04:30.157580 systemd[1]: sshd@43-147.75.203.91:22-139.178.89.65:34524.service: Deactivated successfully.
Sep  4 19:04:30.161420 systemd[1]: session-20.scope: Deactivated successfully.
Sep  4 19:04:30.162710 systemd-logind[1446]: Session 20 logged out. Waiting for processes to exit.
Sep  4 19:04:30.163407 systemd-logind[1446]: Removed session 20.
Sep  4 19:04:30.245026 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:30.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:30.245026 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:30.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:35.245258 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:35.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:35.245258 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:35.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:40.167868 systemd[1]: Started sshd@44-147.75.203.91:22-139.178.89.65:40804.service - OpenSSH per-connection server daemon (139.178.89.65:40804).
Sep  4 19:04:40.195583 sshd[4377]: Accepted publickey for core from 139.178.89.65 port 40804 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:04:40.196313 sshd[4377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:04:40.199099 systemd-logind[1446]: New session 21 of user core.
Sep  4 19:04:40.212369 systemd[1]: Started session-21.scope - Session 21 of User core.
Sep  4 19:04:40.245943 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:40.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:40.245943 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:40.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:45.247182 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:45.246Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:45.247182 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:45.246Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:45.279313 sshd[4377]: pam_unix(sshd:session): session closed for user core
Sep  4 19:04:45.287369 systemd[1]: sshd@44-147.75.203.91:22-139.178.89.65:40804.service: Deactivated successfully.
Sep  4 19:04:45.290483 systemd[1]: session-21.scope: Deactivated successfully.
Sep  4 19:04:45.290919 systemd-logind[1446]: Session 21 logged out. Waiting for processes to exit.
Sep  4 19:04:45.291517 systemd-logind[1446]: Removed session 21.
Sep  4 19:04:50.248192 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:50.247Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:50.248192 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:50.247Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:55.248487 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:55.247Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:55.248487 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:04:55.247Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:04:55.294960 systemd[1]: Started sshd@45-147.75.203.91:22-139.178.89.65:49202.service - OpenSSH per-connection server daemon (139.178.89.65:49202).
Sep  4 19:04:55.322784 sshd[4413]: Accepted publickey for core from 139.178.89.65 port 49202 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:04:55.323673 sshd[4413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:04:55.327018 systemd-logind[1446]: New session 22 of user core.
Sep  4 19:04:55.353416 systemd[1]: Started session-22.scope - Session 22 of User core.
Sep  4 19:05:00.248840 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:00.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:00.248840 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:00.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:00.422761 sshd[4413]: pam_unix(sshd:session): session closed for user core
Sep  4 19:05:00.430692 systemd[1]: sshd@45-147.75.203.91:22-139.178.89.65:49202.service: Deactivated successfully.
Sep  4 19:05:00.434406 systemd[1]: session-22.scope: Deactivated successfully.
Sep  4 19:05:00.434896 systemd-logind[1446]: Session 22 logged out. Waiting for processes to exit.
Sep  4 19:05:00.435605 systemd-logind[1446]: Removed session 22.
Sep  4 19:05:05.249045 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:05.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:05.249045 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:05.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:10.249198 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:10.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:10.249198 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:10.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:10.446487 systemd[1]: Started sshd@46-147.75.203.91:22-139.178.89.65:54948.service - OpenSSH per-connection server daemon (139.178.89.65:54948).
Sep  4 19:05:10.471891 sshd[4451]: Accepted publickey for core from 139.178.89.65 port 54948 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:05:10.472825 sshd[4451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:05:10.476156 systemd-logind[1446]: New session 23 of user core.
Sep  4 19:05:10.491455 systemd[1]: Started session-23.scope - Session 23 of User core.
Sep  4 19:05:15.249507 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:15.248Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:15.249507 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:15.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:15.560890 sshd[4451]: pam_unix(sshd:session): session closed for user core
Sep  4 19:05:15.568876 systemd[1]: sshd@46-147.75.203.91:22-139.178.89.65:54948.service: Deactivated successfully.
Sep  4 19:05:15.571899 systemd[1]: session-23.scope: Deactivated successfully.
Sep  4 19:05:15.572438 systemd-logind[1446]: Session 23 logged out. Waiting for processes to exit.
Sep  4 19:05:15.573074 systemd-logind[1446]: Removed session 23.
Sep  4 19:05:20.249798 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:20.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:20.249798 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:20.249Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:25.250633 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:25.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:25.250633 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:25.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:25.575037 systemd[1]: Started sshd@47-147.75.203.91:22-139.178.89.65:56200.service - OpenSSH per-connection server daemon (139.178.89.65:56200).
Sep  4 19:05:25.604665 sshd[4488]: Accepted publickey for core from 139.178.89.65 port 56200 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:05:25.605448 sshd[4488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:05:25.608400 systemd-logind[1446]: New session 24 of user core.
Sep  4 19:05:25.624378 systemd[1]: Started session-24.scope - Session 24 of User core.
Sep  4 19:05:30.251428 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:30.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:30.251428 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:30.250Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:30.690702 sshd[4488]: pam_unix(sshd:session): session closed for user core
Sep  4 19:05:30.693474 systemd[1]: sshd@47-147.75.203.91:22-139.178.89.65:56200.service: Deactivated successfully.
Sep  4 19:05:30.695056 systemd[1]: session-24.scope: Deactivated successfully.
Sep  4 19:05:30.696382 systemd-logind[1446]: Session 24 logged out. Waiting for processes to exit.
Sep  4 19:05:30.697515 systemd-logind[1446]: Removed session 24.
Sep  4 19:05:35.251562 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:35.251Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:35.251562 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:35.251Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:40.251855 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:40.251Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:40.251855 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:40.251Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:40.720838 systemd[1]: Started sshd@48-147.75.203.91:22-139.178.89.65:42526.service - OpenSSH per-connection server daemon (139.178.89.65:42526).
Sep  4 19:05:40.750457 sshd[4524]: Accepted publickey for core from 139.178.89.65 port 42526 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:05:40.751205 sshd[4524]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:05:40.754059 systemd-logind[1446]: New session 25 of user core.
Sep  4 19:05:40.764625 systemd[1]: Started session-25.scope - Session 25 of User core.
Sep  4 19:05:45.252768 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:45.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:45.252768 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:45.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:45.839955 sshd[4524]: pam_unix(sshd:session): session closed for user core
Sep  4 19:05:45.847927 systemd[1]: sshd@48-147.75.203.91:22-139.178.89.65:42526.service: Deactivated successfully.
Sep  4 19:05:45.850033 systemd[1]: session-25.scope: Deactivated successfully.
Sep  4 19:05:45.850843 systemd-logind[1446]: Session 25 logged out. Waiting for processes to exit.
Sep  4 19:05:45.851520 systemd-logind[1446]: Removed session 25.
Sep  4 19:05:46.414442 systemd[1]: Started sshd@49-147.75.203.91:22-43.130.16.82:57964.service - OpenSSH per-connection server daemon (43.130.16.82:57964).
Sep  4 19:05:46.524257 sshd[4549]: Invalid user futurista from 43.130.16.82 port 57964
Sep  4 19:05:46.533573 sshd[4549]: Received disconnect from 43.130.16.82 port 57964:11: Bye Bye [preauth]
Sep  4 19:05:46.533573 sshd[4549]: Disconnected from invalid user futurista 43.130.16.82 port 57964 [preauth]
Sep  4 19:05:46.536529 systemd[1]: sshd@49-147.75.203.91:22-43.130.16.82:57964.service: Deactivated successfully.
Sep  4 19:05:50.253575 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:50.252Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:50.253575 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:50.253Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:55.254551 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:55.253Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:55.254551 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:05:55.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:05:55.851627 systemd[1]: Started sshd@50-147.75.203.91:22-139.178.89.65:51282.service - OpenSSH per-connection server daemon (139.178.89.65:51282).
Sep  4 19:05:55.882459 sshd[4566]: Accepted publickey for core from 139.178.89.65 port 51282 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:05:55.885735 sshd[4566]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:05:55.889920 systemd-logind[1446]: New session 26 of user core.
Sep  4 19:05:55.899476 systemd[1]: Started session-26.scope - Session 26 of User core.
Sep  4 19:06:00.254957 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:06:00.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:06:00.254957 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:06:00.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:06:00.961974 sshd[4566]: pam_unix(sshd:session): session closed for user core
Sep  4 19:06:00.968443 systemd[1]: sshd@50-147.75.203.91:22-139.178.89.65:51282.service: Deactivated successfully.
Sep  4 19:06:00.972230 systemd[1]: session-26.scope: Deactivated successfully.
Sep  4 19:06:00.973475 systemd-logind[1446]: Session 26 logged out. Waiting for processes to exit.
Sep  4 19:06:00.974116 systemd-logind[1446]: Removed session 26.
Sep  4 19:06:05.255182 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:06:05.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:06:05.255182 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:06:05.254Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:06:10.256256 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:06:10.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:06:10.256256 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:06:10.255Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:06:10.992562 systemd[1]: Started sshd@51-147.75.203.91:22-139.178.89.65:44064.service - OpenSSH per-connection server daemon (139.178.89.65:44064).
Sep  4 19:06:11.019333 sshd[4607]: Accepted publickey for core from 139.178.89.65 port 44064 ssh2: RSA SHA256:lmsE2MjqCPdoIVetvchUpFMvYfQEbO9QwRbru7kVnTU
Sep  4 19:06:11.022635 sshd[4607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Sep  4 19:06:11.033796 systemd-logind[1446]: New session 27 of user core.
Sep  4 19:06:11.047609 systemd[1]: Started session-27.scope - Session 27 of User core.
Sep  4 19:06:11.650589 systemd[1]: Started sshd@52-147.75.203.91:22-85.209.11.254:62174.service - OpenSSH per-connection server daemon (85.209.11.254:62174).
Sep  4 19:06:13.765678 sshd[4623]: Invalid user username from 85.209.11.254 port 62174
Sep  4 19:06:13.957587 sshd[4623]: Connection closed by invalid user username 85.209.11.254 port 62174 [preauth]
Sep  4 19:06:13.958365 systemd[1]: sshd@52-147.75.203.91:22-85.209.11.254:62174.service: Deactivated successfully.
Sep  4 19:06:15.256605 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:06:15.256Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:06:15.256605 etcd-wrapper[2519]: {"level":"warn","ts":"2024-09-04T19:06:15.256Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4a3893e07ab52c16","rtt":"0s","error":"dial tcp 10.67.80.59:2380: i/o timeout"}
Sep  4 19:06:16.125742 sshd[4607]: pam_unix(sshd:session): session closed for user core
Sep  4 19:06:16.132466 systemd[1]: sshd@51-147.75.203.91:22-139.178.89.65:44064.service: Deactivated successfully.
Sep  4 19:06:16.136289 systemd[1]: session-27.scope: Deactivated successfully.
Sep  4 19:06:16.137512 systemd-logind[1446]: Session 27 logged out. Waiting for processes to exit.
Sep  4 19:06:16.138089 systemd-logind[1446]: Removed session 27.