Jan 30 13:56:04.133680 kernel: Linux version 6.6.74-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.3.1_p20240614 p17) 13.3.1 20240614, GNU ld (Gentoo 2.42 p3) 2.42.0) #1 SMP PREEMPT_DYNAMIC Wed Jan 29 10:09:32 -00 2025 Jan 30 13:56:04.133813 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=befc9792b021bef43c896e00e1d5172b6224dbafc9b6c92b267e5e544378e681 Jan 30 13:56:04.133828 kernel: BIOS-provided physical RAM map: Jan 30 13:56:04.133837 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 30 13:56:04.133847 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 30 13:56:04.133857 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 30 13:56:04.133873 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Jan 30 13:56:04.133883 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Jan 30 13:56:04.133894 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Jan 30 13:56:04.133906 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 30 13:56:04.135072 kernel: NX (Execute Disable) protection: active Jan 30 13:56:04.135087 kernel: APIC: Static calls initialized Jan 30 13:56:04.135100 kernel: SMBIOS 2.7 present. Jan 30 13:56:04.135113 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Jan 30 13:56:04.135134 kernel: Hypervisor detected: KVM Jan 30 13:56:04.135148 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 30 13:56:04.135163 kernel: kvm-clock: using sched offset of 7061936781 cycles Jan 30 13:56:04.135178 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 30 13:56:04.135192 kernel: tsc: Detected 2499.996 MHz processor Jan 30 13:56:04.135206 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 30 13:56:04.135221 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 30 13:56:04.135274 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Jan 30 13:56:04.135286 kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Jan 30 13:56:04.135298 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 30 13:56:04.135309 kernel: Using GB pages for direct mapping Jan 30 13:56:04.135320 kernel: ACPI: Early table checksum verification disabled Jan 30 13:56:04.135331 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Jan 30 13:56:04.135343 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Jan 30 13:56:04.135355 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Jan 30 13:56:04.135367 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Jan 30 13:56:04.135382 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Jan 30 13:56:04.135394 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Jan 30 13:56:04.135407 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Jan 30 13:56:04.135419 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Jan 30 13:56:04.135432 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Jan 30 13:56:04.135445 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Jan 30 13:56:04.135458 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Jan 30 13:56:04.135470 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Jan 30 13:56:04.135484 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Jan 30 13:56:04.135503 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Jan 30 13:56:04.135524 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Jan 30 13:56:04.135540 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Jan 30 13:56:04.135555 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Jan 30 13:56:04.135571 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Jan 30 13:56:04.135591 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Jan 30 13:56:04.135607 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Jan 30 13:56:04.135623 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Jan 30 13:56:04.135639 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Jan 30 13:56:04.135655 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jan 30 13:56:04.135671 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jan 30 13:56:04.135686 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Jan 30 13:56:04.135702 kernel: NUMA: Initialized distance table, cnt=1 Jan 30 13:56:04.135718 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Jan 30 13:56:04.135735 kernel: Zone ranges: Jan 30 13:56:04.135927 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 30 13:56:04.135946 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Jan 30 13:56:04.135963 kernel: Normal empty Jan 30 13:56:04.135979 kernel: Movable zone start for each node Jan 30 13:56:04.135994 kernel: Early memory node ranges Jan 30 13:56:04.136011 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 30 13:56:04.136027 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Jan 30 13:56:04.136043 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Jan 30 13:56:04.136061 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 30 13:56:04.136074 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 30 13:56:04.136089 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Jan 30 13:56:04.136103 kernel: ACPI: PM-Timer IO Port: 0xb008 Jan 30 13:56:04.136117 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 30 13:56:04.136132 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Jan 30 13:56:04.136146 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 30 13:56:04.136159 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 30 13:56:04.136172 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 30 13:56:04.136186 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 30 13:56:04.136204 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jan 30 13:56:04.136220 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jan 30 13:56:04.136290 kernel: TSC deadline timer available Jan 30 13:56:04.136306 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jan 30 13:56:04.136321 kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Jan 30 13:56:04.136336 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Jan 30 13:56:04.136351 kernel: Booting paravirtualized kernel on KVM Jan 30 13:56:04.136366 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 30 13:56:04.136382 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:2 nr_cpu_ids:2 nr_node_ids:1 Jan 30 13:56:04.136402 kernel: percpu: Embedded 58 pages/cpu s197032 r8192 d32344 u1048576 Jan 30 13:56:04.136417 kernel: pcpu-alloc: s197032 r8192 d32344 u1048576 alloc=1*2097152 Jan 30 13:56:04.136432 kernel: pcpu-alloc: [0] 0 1 Jan 30 13:56:04.136446 kernel: kvm-guest: PV spinlocks enabled Jan 30 13:56:04.136461 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jan 30 13:56:04.136478 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=befc9792b021bef43c896e00e1d5172b6224dbafc9b6c92b267e5e544378e681 Jan 30 13:56:04.136494 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jan 30 13:56:04.136508 kernel: random: crng init done Jan 30 13:56:04.136526 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 30 13:56:04.136541 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jan 30 13:56:04.136556 kernel: Fallback order for Node 0: 0 Jan 30 13:56:04.136571 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Jan 30 13:56:04.136586 kernel: Policy zone: DMA32 Jan 30 13:56:04.136602 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 30 13:56:04.136618 kernel: Memory: 1932348K/2057760K available (12288K kernel code, 2301K rwdata, 22728K rodata, 42844K init, 2348K bss, 125152K reserved, 0K cma-reserved) Jan 30 13:56:04.136634 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jan 30 13:56:04.136653 kernel: Kernel/User page tables isolation: enabled Jan 30 13:56:04.136668 kernel: ftrace: allocating 37921 entries in 149 pages Jan 30 13:56:04.136683 kernel: ftrace: allocated 149 pages with 4 groups Jan 30 13:56:04.136698 kernel: Dynamic Preempt: voluntary Jan 30 13:56:04.136713 kernel: rcu: Preemptible hierarchical RCU implementation. Jan 30 13:56:04.136729 kernel: rcu: RCU event tracing is enabled. Jan 30 13:56:04.136745 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jan 30 13:56:04.136761 kernel: Trampoline variant of Tasks RCU enabled. Jan 30 13:56:04.136776 kernel: Rude variant of Tasks RCU enabled. Jan 30 13:56:04.136792 kernel: Tracing variant of Tasks RCU enabled. Jan 30 13:56:04.136810 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 30 13:56:04.136824 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jan 30 13:56:04.136838 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jan 30 13:56:04.136853 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jan 30 13:56:04.136868 kernel: Console: colour VGA+ 80x25 Jan 30 13:56:04.136884 kernel: printk: console [ttyS0] enabled Jan 30 13:56:04.136898 kernel: ACPI: Core revision 20230628 Jan 30 13:56:04.136913 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Jan 30 13:56:04.136930 kernel: APIC: Switch to symmetric I/O mode setup Jan 30 13:56:04.136947 kernel: x2apic enabled Jan 30 13:56:04.136961 kernel: APIC: Switched APIC routing to: physical x2apic Jan 30 13:56:04.136990 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Jan 30 13:56:04.137008 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Jan 30 13:56:04.137023 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jan 30 13:56:04.137040 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jan 30 13:56:04.137057 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 30 13:56:04.137073 kernel: Spectre V2 : Mitigation: Retpolines Jan 30 13:56:04.137089 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 30 13:56:04.137105 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jan 30 13:56:04.137122 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Jan 30 13:56:04.137138 kernel: RETBleed: Vulnerable Jan 30 13:56:04.137158 kernel: Speculative Store Bypass: Vulnerable Jan 30 13:56:04.137174 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Jan 30 13:56:04.137191 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jan 30 13:56:04.137207 kernel: GDS: Unknown: Dependent on hypervisor status Jan 30 13:56:04.137223 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 30 13:56:04.137257 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 30 13:56:04.137274 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 30 13:56:04.137288 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Jan 30 13:56:04.137301 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Jan 30 13:56:04.137314 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Jan 30 13:56:04.137328 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Jan 30 13:56:04.137343 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Jan 30 13:56:04.137357 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Jan 30 13:56:04.137372 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 30 13:56:04.137386 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Jan 30 13:56:04.137400 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Jan 30 13:56:04.137415 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Jan 30 13:56:04.137436 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Jan 30 13:56:04.137543 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Jan 30 13:56:04.137565 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Jan 30 13:56:04.137583 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Jan 30 13:56:04.137599 kernel: Freeing SMP alternatives memory: 32K Jan 30 13:56:04.137612 kernel: pid_max: default: 32768 minimum: 301 Jan 30 13:56:04.137627 kernel: LSM: initializing lsm=lockdown,capability,landlock,selinux,integrity Jan 30 13:56:04.137641 kernel: landlock: Up and running. Jan 30 13:56:04.137655 kernel: SELinux: Initializing. Jan 30 13:56:04.137669 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jan 30 13:56:04.137683 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jan 30 13:56:04.137768 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Jan 30 13:56:04.137793 kernel: RCU Tasks: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. Jan 30 13:56:04.137810 kernel: RCU Tasks Rude: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. Jan 30 13:56:04.137825 kernel: RCU Tasks Trace: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=2. Jan 30 13:56:04.137839 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Jan 30 13:56:04.137854 kernel: signal: max sigframe size: 3632 Jan 30 13:56:04.137868 kernel: rcu: Hierarchical SRCU implementation. Jan 30 13:56:04.137883 kernel: rcu: Max phase no-delay instances is 400. Jan 30 13:56:04.137898 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jan 30 13:56:04.137913 kernel: smp: Bringing up secondary CPUs ... Jan 30 13:56:04.137931 kernel: smpboot: x86: Booting SMP configuration: Jan 30 13:56:04.137945 kernel: .... node #0, CPUs: #1 Jan 30 13:56:04.138013 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Jan 30 13:56:04.138031 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jan 30 13:56:04.138046 kernel: smp: Brought up 1 node, 2 CPUs Jan 30 13:56:04.138062 kernel: smpboot: Max logical packages: 1 Jan 30 13:56:04.138077 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Jan 30 13:56:04.138092 kernel: devtmpfs: initialized Jan 30 13:56:04.138111 kernel: x86/mm: Memory block size: 128MB Jan 30 13:56:04.138125 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 30 13:56:04.138140 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jan 30 13:56:04.138156 kernel: pinctrl core: initialized pinctrl subsystem Jan 30 13:56:04.138170 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jan 30 13:56:04.138185 kernel: audit: initializing netlink subsys (disabled) Jan 30 13:56:04.138200 kernel: audit: type=2000 audit(1738245363.291:1): state=initialized audit_enabled=0 res=1 Jan 30 13:56:04.138215 kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 30 13:56:04.138230 kernel: thermal_sys: Registered thermal governor 'user_space' Jan 30 13:56:04.138321 kernel: cpuidle: using governor menu Jan 30 13:56:04.138341 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 30 13:56:04.138357 kernel: dca service started, version 1.12.1 Jan 30 13:56:04.138373 kernel: PCI: Using configuration type 1 for base access Jan 30 13:56:04.138389 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jan 30 13:56:04.138406 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Jan 30 13:56:04.138423 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Jan 30 13:56:04.138440 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Jan 30 13:56:04.138456 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Jan 30 13:56:04.138478 kernel: ACPI: Added _OSI(Module Device) Jan 30 13:56:04.138494 kernel: ACPI: Added _OSI(Processor Device) Jan 30 13:56:04.138510 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 30 13:56:04.138527 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 30 13:56:04.138543 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Jan 30 13:56:04.138652 kernel: ACPI: _OSC evaluation for CPUs failed, trying _PDC Jan 30 13:56:04.138675 kernel: ACPI: Interpreter enabled Jan 30 13:56:04.138693 kernel: ACPI: PM: (supports S0 S5) Jan 30 13:56:04.138710 kernel: ACPI: Using IOAPIC for interrupt routing Jan 30 13:56:04.138731 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 30 13:56:04.138748 kernel: PCI: Using E820 reservations for host bridge windows Jan 30 13:56:04.138765 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Jan 30 13:56:04.138782 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 30 13:56:04.139051 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jan 30 13:56:04.139308 kernel: acpi PNP0A03:00: _OSC: not requesting OS control; OS requires [ExtendedConfig ASPM ClockPM MSI] Jan 30 13:56:04.139532 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended configuration space under this bridge Jan 30 13:56:04.139554 kernel: acpiphp: Slot [3] registered Jan 30 13:56:04.139576 kernel: acpiphp: Slot [4] registered Jan 30 13:56:04.139591 kernel: acpiphp: Slot [5] registered Jan 30 13:56:04.139606 kernel: acpiphp: Slot [6] registered Jan 30 13:56:04.139620 kernel: acpiphp: Slot [7] registered Jan 30 13:56:04.139633 kernel: acpiphp: Slot [8] registered Jan 30 13:56:04.139646 kernel: acpiphp: Slot [9] registered Jan 30 13:56:04.139661 kernel: acpiphp: Slot [10] registered Jan 30 13:56:04.139676 kernel: acpiphp: Slot [11] registered Jan 30 13:56:04.139692 kernel: acpiphp: Slot [12] registered Jan 30 13:56:04.139710 kernel: acpiphp: Slot [13] registered Jan 30 13:56:04.139725 kernel: acpiphp: Slot [14] registered Jan 30 13:56:04.139737 kernel: acpiphp: Slot [15] registered Jan 30 13:56:04.139750 kernel: acpiphp: Slot [16] registered Jan 30 13:56:04.139764 kernel: acpiphp: Slot [17] registered Jan 30 13:56:04.139778 kernel: acpiphp: Slot [18] registered Jan 30 13:56:04.139792 kernel: acpiphp: Slot [19] registered Jan 30 13:56:04.139806 kernel: acpiphp: Slot [20] registered Jan 30 13:56:04.139820 kernel: acpiphp: Slot [21] registered Jan 30 13:56:04.139837 kernel: acpiphp: Slot [22] registered Jan 30 13:56:04.139852 kernel: acpiphp: Slot [23] registered Jan 30 13:56:04.139866 kernel: acpiphp: Slot [24] registered Jan 30 13:56:04.139936 kernel: acpiphp: Slot [25] registered Jan 30 13:56:04.139950 kernel: acpiphp: Slot [26] registered Jan 30 13:56:04.139964 kernel: acpiphp: Slot [27] registered Jan 30 13:56:04.139979 kernel: acpiphp: Slot [28] registered Jan 30 13:56:04.139993 kernel: acpiphp: Slot [29] registered Jan 30 13:56:04.140008 kernel: acpiphp: Slot [30] registered Jan 30 13:56:04.140022 kernel: acpiphp: Slot [31] registered Jan 30 13:56:04.140041 kernel: PCI host bridge to bus 0000:00 Jan 30 13:56:04.140411 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 30 13:56:04.140561 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 30 13:56:04.140678 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 30 13:56:04.140794 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Jan 30 13:56:04.140913 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 30 13:56:04.141077 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jan 30 13:56:04.141251 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jan 30 13:56:04.141406 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Jan 30 13:56:04.141546 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Jan 30 13:56:04.141687 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Jan 30 13:56:04.141917 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Jan 30 13:56:04.142059 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Jan 30 13:56:04.142197 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Jan 30 13:56:04.142358 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Jan 30 13:56:04.142498 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Jan 30 13:56:04.142638 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Jan 30 13:56:04.142776 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x180 took 15625 usecs Jan 30 13:56:04.142922 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Jan 30 13:56:04.143062 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Jan 30 13:56:04.143203 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Jan 30 13:56:04.143353 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 30 13:56:04.143556 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Jan 30 13:56:04.143689 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Jan 30 13:56:04.143891 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Jan 30 13:56:04.144030 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Jan 30 13:56:04.144051 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jan 30 13:56:04.144071 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jan 30 13:56:04.144087 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jan 30 13:56:04.144102 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jan 30 13:56:04.144117 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jan 30 13:56:04.144133 kernel: iommu: Default domain type: Translated Jan 30 13:56:04.144148 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jan 30 13:56:04.144164 kernel: PCI: Using ACPI for IRQ routing Jan 30 13:56:04.144180 kernel: PCI: pci_cache_line_size set to 64 bytes Jan 30 13:56:04.144195 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 30 13:56:04.144214 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Jan 30 13:56:04.144370 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Jan 30 13:56:04.144528 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Jan 30 13:56:04.144799 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 30 13:56:04.144825 kernel: vgaarb: loaded Jan 30 13:56:04.144841 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Jan 30 13:56:04.144857 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Jan 30 13:56:04.144873 kernel: clocksource: Switched to clocksource kvm-clock Jan 30 13:56:04.144892 kernel: VFS: Disk quotas dquot_6.6.0 Jan 30 13:56:04.144906 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 30 13:56:04.144921 kernel: pnp: PnP ACPI init Jan 30 13:56:04.144936 kernel: pnp: PnP ACPI: found 5 devices Jan 30 13:56:04.144951 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 30 13:56:04.146150 kernel: NET: Registered PF_INET protocol family Jan 30 13:56:04.146176 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 30 13:56:04.146191 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jan 30 13:56:04.146208 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jan 30 13:56:04.146229 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jan 30 13:56:04.146279 kernel: TCP bind hash table entries: 16384 (order: 7, 524288 bytes, linear) Jan 30 13:56:04.146292 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jan 30 13:56:04.146306 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jan 30 13:56:04.146318 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jan 30 13:56:04.146330 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jan 30 13:56:04.146343 kernel: NET: Registered PF_XDP protocol family Jan 30 13:56:04.147835 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 30 13:56:04.147981 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 30 13:56:04.150104 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 30 13:56:04.150334 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Jan 30 13:56:04.150679 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jan 30 13:56:04.150708 kernel: PCI: CLS 0 bytes, default 64 Jan 30 13:56:04.150723 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jan 30 13:56:04.150739 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Jan 30 13:56:04.150753 kernel: clocksource: Switched to clocksource tsc Jan 30 13:56:04.150768 kernel: Initialise system trusted keyrings Jan 30 13:56:04.150790 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jan 30 13:56:04.150804 kernel: Key type asymmetric registered Jan 30 13:56:04.150818 kernel: Asymmetric key parser 'x509' registered Jan 30 13:56:04.150832 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Jan 30 13:56:04.150847 kernel: io scheduler mq-deadline registered Jan 30 13:56:04.150861 kernel: io scheduler kyber registered Jan 30 13:56:04.150874 kernel: io scheduler bfq registered Jan 30 13:56:04.150888 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jan 30 13:56:04.150902 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 30 13:56:04.150919 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 30 13:56:04.150933 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 30 13:56:04.150948 kernel: i8042: Warning: Keylock active Jan 30 13:56:04.150961 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 30 13:56:04.150976 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 30 13:56:04.151130 kernel: rtc_cmos 00:00: RTC can wake from S4 Jan 30 13:56:04.152293 kernel: rtc_cmos 00:00: registered as rtc0 Jan 30 13:56:04.152445 kernel: rtc_cmos 00:00: setting system clock to 2025-01-30T13:56:03 UTC (1738245363) Jan 30 13:56:04.152580 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Jan 30 13:56:04.152600 kernel: intel_pstate: CPU model not supported Jan 30 13:56:04.152616 kernel: NET: Registered PF_INET6 protocol family Jan 30 13:56:04.152633 kernel: Segment Routing with IPv6 Jan 30 13:56:04.152649 kernel: In-situ OAM (IOAM) with IPv6 Jan 30 13:56:04.152666 kernel: NET: Registered PF_PACKET protocol family Jan 30 13:56:04.152682 kernel: Key type dns_resolver registered Jan 30 13:56:04.152698 kernel: IPI shorthand broadcast: enabled Jan 30 13:56:04.152714 kernel: sched_clock: Marking stable (865002170, 302854831)->(1286677054, -118820053) Jan 30 13:56:04.152734 kernel: registered taskstats version 1 Jan 30 13:56:04.152750 kernel: Loading compiled-in X.509 certificates Jan 30 13:56:04.152766 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.6.74-flatcar: 1efdcbe72fc44d29e4e6411cf9a3e64046be4375' Jan 30 13:56:04.152781 kernel: Key type .fscrypt registered Jan 30 13:56:04.152796 kernel: Key type fscrypt-provisioning registered Jan 30 13:56:04.152812 kernel: ima: No TPM chip found, activating TPM-bypass! Jan 30 13:56:04.152829 kernel: ima: Allocated hash algorithm: sha1 Jan 30 13:56:04.152844 kernel: ima: No architecture policies found Jan 30 13:56:04.152864 kernel: clk: Disabling unused clocks Jan 30 13:56:04.152880 kernel: Freeing unused kernel image (initmem) memory: 42844K Jan 30 13:56:04.152896 kernel: Write protecting the kernel read-only data: 36864k Jan 30 13:56:04.152912 kernel: Freeing unused kernel image (rodata/data gap) memory: 1848K Jan 30 13:56:04.152928 kernel: Run /init as init process Jan 30 13:56:04.152944 kernel: with arguments: Jan 30 13:56:04.152959 kernel: /init Jan 30 13:56:04.152975 kernel: with environment: Jan 30 13:56:04.152990 kernel: HOME=/ Jan 30 13:56:04.153005 kernel: TERM=linux Jan 30 13:56:04.153024 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jan 30 13:56:04.153069 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) Jan 30 13:56:04.153089 systemd[1]: Detected virtualization amazon. Jan 30 13:56:04.153107 systemd[1]: Detected architecture x86-64. Jan 30 13:56:04.153124 systemd[1]: Running in initrd. Jan 30 13:56:04.153141 systemd[1]: No hostname configured, using default hostname. Jan 30 13:56:04.153158 systemd[1]: Hostname set to . Jan 30 13:56:04.153179 systemd[1]: Initializing machine ID from VM UUID. Jan 30 13:56:04.153196 systemd[1]: Queued start job for default target initrd.target. Jan 30 13:56:04.153214 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Jan 30 13:56:04.153231 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jan 30 13:56:04.153282 systemd[1]: Expecting device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device - /dev/disk/by-label/EFI-SYSTEM... Jan 30 13:56:04.153299 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Jan 30 13:56:04.153317 systemd[1]: Expecting device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT... Jan 30 13:56:04.153339 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A... Jan 30 13:56:04.153359 systemd[1]: Expecting device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132... Jan 30 13:56:04.153376 systemd[1]: Expecting device dev-mapper-usr.device - /dev/mapper/usr... Jan 30 13:56:04.153394 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Jan 30 13:56:04.153412 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jan 30 13:56:04.153429 systemd[1]: Reached target paths.target - Path Units. Jan 30 13:56:04.153447 systemd[1]: Reached target slices.target - Slice Units. Jan 30 13:56:04.153467 systemd[1]: Reached target swap.target - Swaps. Jan 30 13:56:04.153485 systemd[1]: Reached target timers.target - Timer Units. Jan 30 13:56:04.153502 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Jan 30 13:56:04.153520 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jan 30 13:56:04.153538 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Jan 30 13:56:04.153556 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Jan 30 13:56:04.153573 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jan 30 13:56:04.153591 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jan 30 13:56:04.153608 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jan 30 13:56:04.153629 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jan 30 13:56:04.153646 systemd[1]: Reached target sockets.target - Socket Units. Jan 30 13:56:04.153664 systemd[1]: Starting ignition-setup-pre.service - Ignition env setup... Jan 30 13:56:04.153681 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jan 30 13:56:04.153766 systemd[1]: Finished network-cleanup.service - Network Cleanup. Jan 30 13:56:04.153796 systemd[1]: Starting systemd-fsck-usr.service... Jan 30 13:56:04.153814 systemd[1]: Starting systemd-journald.service - Journal Service... Jan 30 13:56:04.153832 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jan 30 13:56:04.153850 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Jan 30 13:56:04.153947 systemd-journald[178]: Collecting audit messages is disabled. Jan 30 13:56:04.154719 systemd[1]: Finished ignition-setup-pre.service - Ignition env setup. Jan 30 13:56:04.154751 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jan 30 13:56:04.154770 systemd[1]: Finished systemd-fsck-usr.service. Jan 30 13:56:04.154792 systemd-journald[178]: Journal started Jan 30 13:56:04.154836 systemd-journald[178]: Runtime Journal (/run/log/journal/ec2df8485e43c537d6435d556a7973a9) is 4.8M, max 38.6M, 33.7M free. Jan 30 13:56:04.158265 systemd[1]: Started systemd-journald.service - Journal Service. Jan 30 13:56:04.162783 systemd-modules-load[179]: Inserted module 'overlay' Jan 30 13:56:04.193581 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully... Jan 30 13:56:04.201489 systemd[1]: Starting systemd-tmpfiles-setup.service - Create System Files and Directories... Jan 30 13:56:04.240270 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jan 30 13:56:04.243302 kernel: Bridge firewalling registered Jan 30 13:56:04.243013 systemd-modules-load[179]: Inserted module 'br_netfilter' Jan 30 13:56:04.244310 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jan 30 13:56:04.350878 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jan 30 13:56:04.357678 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Jan 30 13:56:04.396032 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Jan 30 13:56:04.401304 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Jan 30 13:56:04.417287 systemd[1]: Finished systemd-tmpfiles-setup.service - Create System Files and Directories. Jan 30 13:56:04.427043 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jan 30 13:56:04.436033 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jan 30 13:56:04.439787 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jan 30 13:56:04.463130 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jan 30 13:56:04.481330 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Jan 30 13:56:04.484918 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jan 30 13:56:04.514538 dracut-cmdline[214]: dracut-dracut-053 Jan 30 13:56:04.520638 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=befc9792b021bef43c896e00e1d5172b6224dbafc9b6c92b267e5e544378e681 Jan 30 13:56:04.534994 systemd-resolved[202]: Positive Trust Anchors: Jan 30 13:56:04.535013 systemd-resolved[202]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 30 13:56:04.535077 systemd-resolved[202]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 170.0.0.192.in-addr.arpa 171.0.0.192.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa ipv4only.arpa resolver.arpa corp home internal intranet lan local private test Jan 30 13:56:04.541728 systemd-resolved[202]: Defaulting to hostname 'linux'. Jan 30 13:56:04.543557 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jan 30 13:56:04.545029 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jan 30 13:56:04.679271 kernel: SCSI subsystem initialized Jan 30 13:56:04.690280 kernel: Loading iSCSI transport class v2.0-870. Jan 30 13:56:04.703267 kernel: iscsi: registered transport (tcp) Jan 30 13:56:04.737477 kernel: iscsi: registered transport (qla4xxx) Jan 30 13:56:04.737567 kernel: QLogic iSCSI HBA Driver Jan 30 13:56:04.786993 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Jan 30 13:56:04.793455 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Jan 30 13:56:04.825123 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jan 30 13:56:04.825209 kernel: device-mapper: uevent: version 1.0.3 Jan 30 13:56:04.825232 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@redhat.com Jan 30 13:56:04.871291 kernel: raid6: avx512x4 gen() 16057 MB/s Jan 30 13:56:04.888289 kernel: raid6: avx512x2 gen() 15269 MB/s Jan 30 13:56:04.906340 kernel: raid6: avx512x1 gen() 7708 MB/s Jan 30 13:56:04.924375 kernel: raid6: avx2x4 gen() 8097 MB/s Jan 30 13:56:04.942290 kernel: raid6: avx2x2 gen() 5557 MB/s Jan 30 13:56:04.959751 kernel: raid6: avx2x1 gen() 5601 MB/s Jan 30 13:56:04.959833 kernel: raid6: using algorithm avx512x4 gen() 16057 MB/s Jan 30 13:56:04.977269 kernel: raid6: .... xor() 5744 MB/s, rmw enabled Jan 30 13:56:04.977344 kernel: raid6: using avx512x2 recovery algorithm Jan 30 13:56:05.002261 kernel: xor: automatically using best checksumming function avx Jan 30 13:56:05.211276 kernel: Btrfs loaded, zoned=no, fsverity=no Jan 30 13:56:05.223589 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Jan 30 13:56:05.235878 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jan 30 13:56:05.260960 systemd-udevd[397]: Using default interface naming scheme 'v255'. Jan 30 13:56:05.267526 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jan 30 13:56:05.283425 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Jan 30 13:56:05.315095 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Jan 30 13:56:05.361863 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Jan 30 13:56:05.368854 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jan 30 13:56:05.477062 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jan 30 13:56:05.495042 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Jan 30 13:56:05.553736 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Jan 30 13:56:05.559446 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Jan 30 13:56:05.560880 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jan 30 13:56:05.562271 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jan 30 13:56:05.572715 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Jan 30 13:56:05.605130 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Jan 30 13:56:05.631416 kernel: cryptd: max_cpu_qlen set to 1000 Jan 30 13:56:05.651045 kernel: ena 0000:00:05.0: ENA device version: 0.10 Jan 30 13:56:05.689233 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Jan 30 13:56:05.689638 kernel: AVX2 version of gcm_enc/dec engaged. Jan 30 13:56:05.689679 kernel: AES CTR mode by8 optimization enabled Jan 30 13:56:05.689700 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Jan 30 13:56:05.689911 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:60:7f:fb:71:3b Jan 30 13:56:05.674785 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jan 30 13:56:05.674956 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jan 30 13:56:05.678428 systemd[1]: Stopping dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Jan 30 13:56:05.682046 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 30 13:56:05.682296 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Jan 30 13:56:05.685681 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup... Jan 30 13:56:05.701929 (udev-worker)[447]: Network interface NamePolicy= disabled on kernel command line. Jan 30 13:56:05.717604 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Jan 30 13:56:05.742435 kernel: nvme nvme0: pci function 0000:00:04.0 Jan 30 13:56:05.742777 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jan 30 13:56:05.763488 kernel: nvme nvme0: 2/0/0 default/read/poll queues Jan 30 13:56:05.770262 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 30 13:56:05.770335 kernel: GPT:9289727 != 16777215 Jan 30 13:56:05.770354 kernel: GPT:Alternate GPT header not at the end of the disk. Jan 30 13:56:05.770372 kernel: GPT:9289727 != 16777215 Jan 30 13:56:05.770388 kernel: GPT: Use GNU Parted to correct GPT errors. Jan 30 13:56:05.770406 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jan 30 13:56:05.872409 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (448) Jan 30 13:56:05.926266 kernel: BTRFS: device fsid 64bb5b5a-85cc-41cc-a02b-2cfaa3e93b0a devid 1 transid 38 /dev/nvme0n1p3 scanned by (udev-worker) (458) Jan 30 13:56:05.955680 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Jan 30 13:56:05.970352 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Jan 30 13:56:06.014823 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Amazon Elastic Block Store OEM. Jan 30 13:56:06.089555 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jan 30 13:56:06.111530 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device - Amazon Elastic Block Store EFI-SYSTEM. Jan 30 13:56:06.150822 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Amazon Elastic Block Store ROOT. Jan 30 13:56:06.163526 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Amazon Elastic Block Store USR-A. Jan 30 13:56:06.164425 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Amazon Elastic Block Store USR-A. Jan 30 13:56:06.182505 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Jan 30 13:56:06.214093 disk-uuid[630]: Primary Header is updated. Jan 30 13:56:06.214093 disk-uuid[630]: Secondary Entries is updated. Jan 30 13:56:06.214093 disk-uuid[630]: Secondary Header is updated. Jan 30 13:56:06.221265 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jan 30 13:56:06.228281 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jan 30 13:56:06.234264 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jan 30 13:56:07.241875 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jan 30 13:56:07.244644 disk-uuid[631]: The operation has completed successfully. Jan 30 13:56:07.489491 systemd[1]: disk-uuid.service: Deactivated successfully. Jan 30 13:56:07.489616 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Jan 30 13:56:07.531637 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr... Jan 30 13:56:07.553668 sh[974]: Success Jan 30 13:56:07.575286 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jan 30 13:56:07.710231 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr. Jan 30 13:56:07.727377 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr... Jan 30 13:56:07.739520 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr. Jan 30 13:56:07.777025 kernel: BTRFS info (device dm-0): first mount of filesystem 64bb5b5a-85cc-41cc-a02b-2cfaa3e93b0a Jan 30 13:56:07.777099 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Jan 30 13:56:07.777119 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead Jan 30 13:56:07.777140 kernel: BTRFS info (device dm-0): disabling log replay at mount time Jan 30 13:56:07.777649 kernel: BTRFS info (device dm-0): using free space tree Jan 30 13:56:07.870279 kernel: BTRFS info (device dm-0): enabling ssd optimizations Jan 30 13:56:07.883899 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr. Jan 30 13:56:07.884729 systemd[1]: afterburn-network-kargs.service - Afterburn Initrd Setup Network Kernel Arguments was skipped because no trigger condition checks were met. Jan 30 13:56:07.895479 systemd[1]: Starting ignition-setup.service - Ignition (setup)... Jan 30 13:56:07.899453 systemd[1]: Starting parse-ip-for-networkd.service - Write systemd-networkd units from cmdline... Jan 30 13:56:07.935763 kernel: BTRFS info (device nvme0n1p6): first mount of filesystem aa75aabd-8755-4402-b4b6-23093345fe03 Jan 30 13:56:07.935830 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jan 30 13:56:07.935850 kernel: BTRFS info (device nvme0n1p6): using free space tree Jan 30 13:56:07.941263 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jan 30 13:56:07.957636 kernel: BTRFS info (device nvme0n1p6): last unmount of filesystem aa75aabd-8755-4402-b4b6-23093345fe03 Jan 30 13:56:07.957005 systemd[1]: mnt-oem.mount: Deactivated successfully. Jan 30 13:56:07.966800 systemd[1]: Finished ignition-setup.service - Ignition (setup). Jan 30 13:56:07.974631 systemd[1]: Starting ignition-fetch-offline.service - Ignition (fetch-offline)... Jan 30 13:56:08.031540 systemd[1]: Finished parse-ip-for-networkd.service - Write systemd-networkd units from cmdline. Jan 30 13:56:08.046031 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jan 30 13:56:08.114050 systemd-networkd[1166]: lo: Link UP Jan 30 13:56:08.114064 systemd-networkd[1166]: lo: Gained carrier Jan 30 13:56:08.116158 systemd-networkd[1166]: Enumeration completed Jan 30 13:56:08.116664 systemd-networkd[1166]: eth0: found matching network '/usr/lib/systemd/network/zz-default.network', based on potentially unpredictable interface name. Jan 30 13:56:08.116669 systemd-networkd[1166]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jan 30 13:56:08.117789 systemd[1]: Started systemd-networkd.service - Network Configuration. Jan 30 13:56:08.121571 systemd[1]: Reached target network.target - Network. Jan 30 13:56:08.129418 systemd-networkd[1166]: eth0: Link UP Jan 30 13:56:08.129425 systemd-networkd[1166]: eth0: Gained carrier Jan 30 13:56:08.129664 systemd-networkd[1166]: eth0: found matching network '/usr/lib/systemd/network/zz-default.network', based on potentially unpredictable interface name. Jan 30 13:56:08.144854 systemd-networkd[1166]: eth0: DHCPv4 address 172.31.21.135/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jan 30 13:56:08.290145 ignition[1095]: Ignition 2.19.0 Jan 30 13:56:08.290528 ignition[1095]: Stage: fetch-offline Jan 30 13:56:08.290792 ignition[1095]: no configs at "/usr/lib/ignition/base.d" Jan 30 13:56:08.290805 ignition[1095]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jan 30 13:56:08.291210 ignition[1095]: Ignition finished successfully Jan 30 13:56:08.296691 systemd[1]: Finished ignition-fetch-offline.service - Ignition (fetch-offline). Jan 30 13:56:08.302447 systemd[1]: Starting ignition-fetch.service - Ignition (fetch)... Jan 30 13:56:08.319201 ignition[1175]: Ignition 2.19.0 Jan 30 13:56:08.319214 ignition[1175]: Stage: fetch Jan 30 13:56:08.319676 ignition[1175]: no configs at "/usr/lib/ignition/base.d" Jan 30 13:56:08.319689 ignition[1175]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jan 30 13:56:08.319802 ignition[1175]: PUT http://169.254.169.254/latest/api/token: attempt #1 Jan 30 13:56:08.367993 ignition[1175]: PUT result: OK Jan 30 13:56:08.374559 ignition[1175]: parsed url from cmdline: "" Jan 30 13:56:08.374570 ignition[1175]: no config URL provided Jan 30 13:56:08.374581 ignition[1175]: reading system config file "/usr/lib/ignition/user.ign" Jan 30 13:56:08.374598 ignition[1175]: no config at "/usr/lib/ignition/user.ign" Jan 30 13:56:08.374623 ignition[1175]: PUT http://169.254.169.254/latest/api/token: attempt #1 Jan 30 13:56:08.375761 ignition[1175]: PUT result: OK Jan 30 13:56:08.375811 ignition[1175]: GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Jan 30 13:56:08.378200 ignition[1175]: GET result: OK Jan 30 13:56:08.378260 ignition[1175]: parsing config with SHA512: 55b3660bcc83a3d212e19916ed98db91565307a9170b382cac2e9be640cf8fcf7f0d75f3ff8abdb34bd98e41efb12fb4cb2d3e872f8f08bdab2a71847a5d2cad Jan 30 13:56:08.390845 unknown[1175]: fetched base config from "system" Jan 30 13:56:08.390862 unknown[1175]: fetched base config from "system" Jan 30 13:56:08.391183 ignition[1175]: fetch: fetch complete Jan 30 13:56:08.390870 unknown[1175]: fetched user config from "aws" Jan 30 13:56:08.391190 ignition[1175]: fetch: fetch passed Jan 30 13:56:08.394326 systemd[1]: Finished ignition-fetch.service - Ignition (fetch). Jan 30 13:56:08.391351 ignition[1175]: Ignition finished successfully Jan 30 13:56:08.403707 systemd[1]: Starting ignition-kargs.service - Ignition (kargs)... Jan 30 13:56:08.428620 ignition[1182]: Ignition 2.19.0 Jan 30 13:56:08.428634 ignition[1182]: Stage: kargs Jan 30 13:56:08.429563 ignition[1182]: no configs at "/usr/lib/ignition/base.d" Jan 30 13:56:08.429799 ignition[1182]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jan 30 13:56:08.429927 ignition[1182]: PUT http://169.254.169.254/latest/api/token: attempt #1 Jan 30 13:56:08.434470 ignition[1182]: PUT result: OK Jan 30 13:56:08.439422 ignition[1182]: kargs: kargs passed Jan 30 13:56:08.439506 ignition[1182]: Ignition finished successfully Jan 30 13:56:08.442396 systemd[1]: Finished ignition-kargs.service - Ignition (kargs). Jan 30 13:56:08.449485 systemd[1]: Starting ignition-disks.service - Ignition (disks)... Jan 30 13:56:08.479232 ignition[1188]: Ignition 2.19.0 Jan 30 13:56:08.479260 ignition[1188]: Stage: disks Jan 30 13:56:08.479976 ignition[1188]: no configs at "/usr/lib/ignition/base.d" Jan 30 13:56:08.479989 ignition[1188]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jan 30 13:56:08.480097 ignition[1188]: PUT http://169.254.169.254/latest/api/token: attempt #1 Jan 30 13:56:08.487630 ignition[1188]: PUT result: OK Jan 30 13:56:08.509178 ignition[1188]: disks: disks passed Jan 30 13:56:08.509296 ignition[1188]: Ignition finished successfully Jan 30 13:56:08.518612 systemd[1]: Finished ignition-disks.service - Ignition (disks). Jan 30 13:56:08.526939 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Jan 30 13:56:08.528692 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Jan 30 13:56:08.543969 systemd[1]: Reached target local-fs.target - Local File Systems. Jan 30 13:56:08.550652 systemd[1]: Reached target sysinit.target - System Initialization. Jan 30 13:56:08.555338 systemd[1]: Reached target basic.target - Basic System. Jan 30 13:56:08.564006 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Jan 30 13:56:08.617129 systemd-fsck[1196]: ROOT: clean, 14/553520 files, 52654/553472 blocks Jan 30 13:56:08.621359 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Jan 30 13:56:08.628352 systemd[1]: Mounting sysroot.mount - /sysroot... Jan 30 13:56:08.759509 kernel: EXT4-fs (nvme0n1p9): mounted filesystem 9f41abed-fd12-4e57-bcd4-5c0ef7f8a1bf r/w with ordered data mode. Quota mode: none. Jan 30 13:56:08.760298 systemd[1]: Mounted sysroot.mount - /sysroot. Jan 30 13:56:08.762706 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Jan 30 13:56:08.772397 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jan 30 13:56:08.778389 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Jan 30 13:56:08.781403 systemd[1]: flatcar-metadata-hostname.service - Flatcar Metadata Hostname Agent was skipped because no trigger condition checks were met. Jan 30 13:56:08.781481 systemd[1]: ignition-remount-sysroot.service - Remount /sysroot read-write for Ignition was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jan 30 13:56:08.781519 systemd[1]: Reached target ignition-diskful.target - Ignition Boot Disk Setup. Jan 30 13:56:08.801004 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Jan 30 13:56:08.806344 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/nvme0n1p6 scanned by mount (1215) Jan 30 13:56:08.809638 kernel: BTRFS info (device nvme0n1p6): first mount of filesystem aa75aabd-8755-4402-b4b6-23093345fe03 Jan 30 13:56:08.809700 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jan 30 13:56:08.809721 kernel: BTRFS info (device nvme0n1p6): using free space tree Jan 30 13:56:08.809603 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Jan 30 13:56:08.817328 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jan 30 13:56:08.822738 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jan 30 13:56:09.161049 initrd-setup-root[1239]: cut: /sysroot/etc/passwd: No such file or directory Jan 30 13:56:09.181228 initrd-setup-root[1246]: cut: /sysroot/etc/group: No such file or directory Jan 30 13:56:09.190305 initrd-setup-root[1253]: cut: /sysroot/etc/shadow: No such file or directory Jan 30 13:56:09.208529 initrd-setup-root[1260]: cut: /sysroot/etc/gshadow: No such file or directory Jan 30 13:56:09.494899 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Jan 30 13:56:09.505652 systemd[1]: Starting ignition-mount.service - Ignition (mount)... Jan 30 13:56:09.508971 systemd-networkd[1166]: eth0: Gained IPv6LL Jan 30 13:56:09.522319 systemd[1]: Starting sysroot-boot.service - /sysroot/boot... Jan 30 13:56:09.539059 systemd[1]: sysroot-oem.mount: Deactivated successfully. Jan 30 13:56:09.540548 kernel: BTRFS info (device nvme0n1p6): last unmount of filesystem aa75aabd-8755-4402-b4b6-23093345fe03 Jan 30 13:56:09.595596 systemd[1]: Finished sysroot-boot.service - /sysroot/boot. Jan 30 13:56:09.620999 ignition[1328]: INFO : Ignition 2.19.0 Jan 30 13:56:09.620999 ignition[1328]: INFO : Stage: mount Jan 30 13:56:09.624170 ignition[1328]: INFO : no configs at "/usr/lib/ignition/base.d" Jan 30 13:56:09.624170 ignition[1328]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jan 30 13:56:09.624170 ignition[1328]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jan 30 13:56:09.624170 ignition[1328]: INFO : PUT result: OK Jan 30 13:56:09.630800 ignition[1328]: INFO : mount: mount passed Jan 30 13:56:09.631917 ignition[1328]: INFO : Ignition finished successfully Jan 30 13:56:09.633756 systemd[1]: Finished ignition-mount.service - Ignition (mount). Jan 30 13:56:09.643378 systemd[1]: Starting ignition-files.service - Ignition (files)... Jan 30 13:56:09.660499 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Jan 30 13:56:09.681669 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1339) Jan 30 13:56:09.683703 kernel: BTRFS info (device nvme0n1p6): first mount of filesystem aa75aabd-8755-4402-b4b6-23093345fe03 Jan 30 13:56:09.683766 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Jan 30 13:56:09.683787 kernel: BTRFS info (device nvme0n1p6): using free space tree Jan 30 13:56:09.688264 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jan 30 13:56:09.690900 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Jan 30 13:56:09.719553 ignition[1356]: INFO : Ignition 2.19.0 Jan 30 13:56:09.719553 ignition[1356]: INFO : Stage: files Jan 30 13:56:09.724035 ignition[1356]: INFO : no configs at "/usr/lib/ignition/base.d" Jan 30 13:56:09.724035 ignition[1356]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jan 30 13:56:09.724035 ignition[1356]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jan 30 13:56:09.724035 ignition[1356]: INFO : PUT result: OK Jan 30 13:56:09.731031 ignition[1356]: DEBUG : files: compiled without relabeling support, skipping Jan 30 13:56:09.746401 ignition[1356]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jan 30 13:56:09.746401 ignition[1356]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jan 30 13:56:09.766895 ignition[1356]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jan 30 13:56:09.768740 ignition[1356]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jan 30 13:56:09.771215 unknown[1356]: wrote ssh authorized keys file for user: core Jan 30 13:56:09.773173 ignition[1356]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jan 30 13:56:09.775920 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jan 30 13:56:09.780986 ignition[1356]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jan 30 13:56:09.780986 ignition[1356]: INFO : files: op(4): [started] processing unit "flannel-docker-opts.service" Jan 30 13:56:09.787322 ignition[1356]: INFO : files: op(4): op(5): [started] writing systemd drop-in "retry.conf" at "/sysroot/etc/systemd/system/flannel-docker-opts.service.d/retry.conf" Jan 30 13:56:09.792194 ignition[1356]: INFO : files: op(4): op(5): [finished] writing systemd drop-in "retry.conf" at "/sysroot/etc/systemd/system/flannel-docker-opts.service.d/retry.conf" Jan 30 13:56:09.792194 ignition[1356]: INFO : files: op(4): [finished] processing unit "flannel-docker-opts.service" Jan 30 13:56:09.792194 ignition[1356]: INFO : files: op(6): [started] processing unit "docker.service" Jan 30 13:56:09.792194 ignition[1356]: INFO : files: op(6): [finished] processing unit "docker.service" Jan 30 13:56:09.792194 ignition[1356]: INFO : files: op(7): [started] processing unit "flanneld.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(7): op(8): [started] writing systemd drop-in "50-network-config.conf" at "/sysroot/etc/systemd/system/flanneld.service.d/50-network-config.conf" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(7): op(8): [finished] writing systemd drop-in "50-network-config.conf" at "/sysroot/etc/systemd/system/flanneld.service.d/50-network-config.conf" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(7): [finished] processing unit "flanneld.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(9): [started] processing unit "etcd-member.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(9): op(a): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(9): op(a): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(9): [finished] processing unit "etcd-member.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(b): [started] setting preset to enabled for "docker.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(b): [finished] setting preset to enabled for "docker.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(c): [started] setting preset to enabled for "etcd-member.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(c): [finished] setting preset to enabled for "etcd-member.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(d): [started] setting preset to enabled for "flanneld.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: op(d): [finished] setting preset to enabled for "flanneld.service" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: createResultFile: createFiles: op(e): [started] writing file "/sysroot/etc/.ignition-result.json" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: createResultFile: createFiles: op(e): [finished] writing file "/sysroot/etc/.ignition-result.json" Jan 30 13:56:09.803299 ignition[1356]: INFO : files: files passed Jan 30 13:56:09.803299 ignition[1356]: INFO : Ignition finished successfully Jan 30 13:56:09.797827 systemd[1]: Finished ignition-files.service - Ignition (files). Jan 30 13:56:09.813589 systemd[1]: Starting ignition-quench.service - Ignition (record completion)... Jan 30 13:56:09.835412 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Jan 30 13:56:09.845483 systemd[1]: ignition-quench.service: Deactivated successfully. Jan 30 13:56:09.846651 systemd[1]: Finished ignition-quench.service - Ignition (record completion). Jan 30 13:56:09.898518 initrd-setup-root-after-ignition[1384]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jan 30 13:56:09.898518 initrd-setup-root-after-ignition[1384]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Jan 30 13:56:09.903546 initrd-setup-root-after-ignition[1388]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jan 30 13:56:09.906369 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Jan 30 13:56:09.908598 systemd[1]: Reached target ignition-complete.target - Ignition Complete. Jan 30 13:56:09.914462 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Jan 30 13:56:09.957431 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 30 13:56:09.957719 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Jan 30 13:56:09.967636 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Jan 30 13:56:09.977409 systemd[1]: Reached target initrd.target - Initrd Default Target. Jan 30 13:56:09.981060 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Jan 30 13:56:09.993571 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Jan 30 13:56:10.010722 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jan 30 13:56:10.018656 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Jan 30 13:56:10.037752 systemd[1]: Stopped target nss-lookup.target - Host and Network Name Lookups. Jan 30 13:56:10.041141 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Jan 30 13:56:10.055215 systemd[1]: Stopped target timers.target - Timer Units. Jan 30 13:56:10.069889 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 30 13:56:10.070178 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Jan 30 13:56:10.083209 systemd[1]: Stopped target initrd.target - Initrd Default Target. Jan 30 13:56:10.087022 systemd[1]: Stopped target basic.target - Basic System. Jan 30 13:56:10.089170 systemd[1]: Stopped target ignition-complete.target - Ignition Complete. Jan 30 13:56:10.093741 systemd[1]: Stopped target ignition-diskful.target - Ignition Boot Disk Setup. Jan 30 13:56:10.098928 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Jan 30 13:56:10.099784 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Jan 30 13:56:10.100114 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Jan 30 13:56:10.100346 systemd[1]: Stopped target sysinit.target - System Initialization. Jan 30 13:56:10.100646 systemd[1]: Stopped target local-fs.target - Local File Systems. Jan 30 13:56:10.101183 systemd[1]: Stopped target swap.target - Swaps. Jan 30 13:56:10.101482 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 30 13:56:10.101671 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Jan 30 13:56:10.102660 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Jan 30 13:56:10.104150 systemd[1]: Stopped target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Jan 30 13:56:10.104627 systemd[1]: clevis-luks-askpass.path: Deactivated successfully. Jan 30 13:56:10.115597 systemd[1]: Stopped clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Jan 30 13:56:10.121850 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 30 13:56:10.122017 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Jan 30 13:56:10.138854 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jan 30 13:56:10.139045 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Jan 30 13:56:10.143442 systemd[1]: ignition-files.service: Deactivated successfully. Jan 30 13:56:10.143571 systemd[1]: Stopped ignition-files.service - Ignition (files). Jan 30 13:56:10.158531 systemd[1]: Stopping ignition-mount.service - Ignition (mount)... Jan 30 13:56:10.188543 systemd[1]: Stopping sysroot-boot.service - /sysroot/boot... Jan 30 13:56:10.189829 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 30 13:56:10.190050 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Jan 30 13:56:10.191992 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 30 13:56:10.192203 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Jan 30 13:56:10.200331 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 30 13:56:10.200547 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Jan 30 13:56:10.223199 ignition[1408]: INFO : Ignition 2.19.0 Jan 30 13:56:10.223199 ignition[1408]: INFO : Stage: umount Jan 30 13:56:10.223199 ignition[1408]: INFO : no configs at "/usr/lib/ignition/base.d" Jan 30 13:56:10.223199 ignition[1408]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jan 30 13:56:10.223199 ignition[1408]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jan 30 13:56:10.222013 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jan 30 13:56:10.239854 ignition[1408]: INFO : PUT result: OK Jan 30 13:56:10.239854 ignition[1408]: INFO : umount: umount passed Jan 30 13:56:10.239854 ignition[1408]: INFO : Ignition finished successfully Jan 30 13:56:10.230122 systemd[1]: sysroot-boot.service: Deactivated successfully. Jan 30 13:56:10.230302 systemd[1]: Stopped sysroot-boot.service - /sysroot/boot. Jan 30 13:56:10.237998 systemd[1]: ignition-mount.service: Deactivated successfully. Jan 30 13:56:10.238125 systemd[1]: Stopped ignition-mount.service - Ignition (mount). Jan 30 13:56:10.245499 systemd[1]: ignition-disks.service: Deactivated successfully. Jan 30 13:56:10.245585 systemd[1]: Stopped ignition-disks.service - Ignition (disks). Jan 30 13:56:10.247998 systemd[1]: ignition-kargs.service: Deactivated successfully. Jan 30 13:56:10.248067 systemd[1]: Stopped ignition-kargs.service - Ignition (kargs). Jan 30 13:56:10.250352 systemd[1]: ignition-fetch.service: Deactivated successfully. Jan 30 13:56:10.250415 systemd[1]: Stopped ignition-fetch.service - Ignition (fetch). Jan 30 13:56:10.253692 systemd[1]: Stopped target network.target - Network. Jan 30 13:56:10.257154 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jan 30 13:56:10.257222 systemd[1]: Stopped ignition-fetch-offline.service - Ignition (fetch-offline). Jan 30 13:56:10.259837 systemd[1]: Stopped target paths.target - Path Units. Jan 30 13:56:10.265280 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 30 13:56:10.267969 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jan 30 13:56:10.272313 systemd[1]: Stopped target slices.target - Slice Units. Jan 30 13:56:10.272581 systemd[1]: Stopped target sockets.target - Socket Units. Jan 30 13:56:10.277535 systemd[1]: iscsid.socket: Deactivated successfully. Jan 30 13:56:10.277650 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Jan 30 13:56:10.284214 systemd[1]: iscsiuio.socket: Deactivated successfully. Jan 30 13:56:10.284298 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Jan 30 13:56:10.286668 systemd[1]: ignition-setup.service: Deactivated successfully. Jan 30 13:56:10.286733 systemd[1]: Stopped ignition-setup.service - Ignition (setup). Jan 30 13:56:10.289279 systemd[1]: ignition-setup-pre.service: Deactivated successfully. Jan 30 13:56:10.289337 systemd[1]: Stopped ignition-setup-pre.service - Ignition env setup. Jan 30 13:56:10.293616 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jan 30 13:56:10.293709 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Jan 30 13:56:10.296319 systemd[1]: Stopping systemd-networkd.service - Network Configuration... Jan 30 13:56:10.300639 systemd[1]: Stopping systemd-resolved.service - Network Name Resolution... Jan 30 13:56:10.315036 systemd-networkd[1166]: eth0: DHCPv6 lease lost Jan 30 13:56:10.316134 systemd[1]: systemd-resolved.service: Deactivated successfully. Jan 30 13:56:10.316359 systemd[1]: Stopped systemd-resolved.service - Network Name Resolution. Jan 30 13:56:10.320366 systemd[1]: systemd-networkd.service: Deactivated successfully. Jan 30 13:56:10.320551 systemd[1]: Stopped systemd-networkd.service - Network Configuration. Jan 30 13:56:10.322001 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jan 30 13:56:10.322063 systemd[1]: Closed systemd-networkd.socket - Network Service Netlink Socket. Jan 30 13:56:10.338063 systemd[1]: Stopping network-cleanup.service - Network Cleanup... Jan 30 13:56:10.349907 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jan 30 13:56:10.350010 systemd[1]: Stopped parse-ip-for-networkd.service - Write systemd-networkd units from cmdline. Jan 30 13:56:10.351096 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 30 13:56:10.351630 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Jan 30 13:56:10.351771 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jan 30 13:56:10.351815 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Jan 30 13:56:10.352057 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jan 30 13:56:10.353733 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create System Files and Directories. Jan 30 13:56:10.354181 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Jan 30 13:56:10.396906 systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 30 13:56:10.397318 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Jan 30 13:56:10.404169 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 30 13:56:10.404377 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Jan 30 13:56:10.408491 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 30 13:56:10.408543 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Jan 30 13:56:10.408624 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 30 13:56:10.408676 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Jan 30 13:56:10.415744 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 30 13:56:10.416331 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Jan 30 13:56:10.432475 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jan 30 13:56:10.432551 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Jan 30 13:56:10.440531 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Jan 30 13:56:10.442140 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 30 13:56:10.442215 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jan 30 13:56:10.449286 systemd[1]: systemd-tmpfiles-setup-dev-early.service: Deactivated successfully. Jan 30 13:56:10.452371 systemd[1]: Stopped systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Jan 30 13:56:10.456214 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 30 13:56:10.456318 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Jan 30 13:56:10.462465 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 30 13:56:10.462556 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Jan 30 13:56:10.476161 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 30 13:56:10.476304 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Jan 30 13:56:10.488561 systemd[1]: network-cleanup.service: Deactivated successfully. Jan 30 13:56:10.489842 systemd[1]: Stopped network-cleanup.service - Network Cleanup. Jan 30 13:56:10.492613 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Jan 30 13:56:10.501511 systemd[1]: Starting initrd-switch-root.service - Switch Root... Jan 30 13:56:10.513056 systemd[1]: Switching root. Jan 30 13:56:10.551791 systemd-journald[178]: Journal stopped Jan 30 13:56:12.621970 systemd-journald[178]: Received SIGTERM from PID 1 (systemd). Jan 30 13:56:12.622073 kernel: SELinux: policy capability network_peer_controls=1 Jan 30 13:56:12.622102 kernel: SELinux: policy capability open_perms=1 Jan 30 13:56:12.622121 kernel: SELinux: policy capability extended_socket_class=1 Jan 30 13:56:12.622145 kernel: SELinux: policy capability always_check_network=0 Jan 30 13:56:12.622168 kernel: SELinux: policy capability cgroup_seclabel=1 Jan 30 13:56:12.622186 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 30 13:56:12.622203 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jan 30 13:56:12.622227 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jan 30 13:56:12.625309 kernel: audit: type=1403 audit(1738245370.784:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 30 13:56:12.625342 systemd[1]: Successfully loaded SELinux policy in 42.685ms. Jan 30 13:56:12.625381 systemd[1]: Relabeled /dev, /dev/shm, /run, /sys/fs/cgroup in 26.634ms. Jan 30 13:56:12.625405 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) Jan 30 13:56:12.625432 systemd[1]: Detected virtualization amazon. Jan 30 13:56:12.625454 systemd[1]: Detected architecture x86-64. Jan 30 13:56:12.625476 systemd[1]: Detected first boot. Jan 30 13:56:12.625498 systemd[1]: Initializing machine ID from VM UUID. Jan 30 13:56:12.625524 zram_generator::config[1451]: No configuration found. Jan 30 13:56:12.630400 systemd[1]: Populated /etc with preset unit settings. Jan 30 13:56:12.630446 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 30 13:56:12.630466 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Jan 30 13:56:12.630484 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 30 13:56:12.630504 systemd[1]: Created slice system-addon\x2dconfig.slice - Slice /system/addon-config. Jan 30 13:56:12.630523 systemd[1]: Created slice system-addon\x2drun.slice - Slice /system/addon-run. Jan 30 13:56:12.630541 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Jan 30 13:56:12.630565 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Jan 30 13:56:12.630583 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Jan 30 13:56:12.630601 systemd[1]: Created slice system-system\x2dcloudinit.slice - Slice /system/system-cloudinit. Jan 30 13:56:12.630629 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Jan 30 13:56:12.630649 systemd[1]: Created slice user.slice - User and Session Slice. Jan 30 13:56:12.630668 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Jan 30 13:56:12.630687 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Jan 30 13:56:12.630705 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Jan 30 13:56:12.630723 systemd[1]: Set up automount boot.automount - Boot partition Automount Point. Jan 30 13:56:12.630745 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Jan 30 13:56:12.630765 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Jan 30 13:56:12.630783 systemd[1]: Expecting device dev-ttyS0.device - /dev/ttyS0... Jan 30 13:56:12.631209 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Jan 30 13:56:12.631230 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Jan 30 13:56:12.631456 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Jan 30 13:56:12.631479 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Jan 30 13:56:12.631502 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Jan 30 13:56:12.631521 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Jan 30 13:56:12.631540 systemd[1]: Reached target remote-fs.target - Remote File Systems. Jan 30 13:56:12.634354 systemd[1]: Reached target slices.target - Slice Units. Jan 30 13:56:12.634391 systemd[1]: Reached target swap.target - Swaps. Jan 30 13:56:12.634415 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Jan 30 13:56:12.634438 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Jan 30 13:56:12.634460 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Jan 30 13:56:12.634482 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Jan 30 13:56:12.634504 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Jan 30 13:56:12.634532 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Jan 30 13:56:12.634555 systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Jan 30 13:56:12.634576 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Jan 30 13:56:12.634598 systemd[1]: Mounting media.mount - External Media Directory... Jan 30 13:56:12.634621 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 30 13:56:12.634643 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Jan 30 13:56:12.634664 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Jan 30 13:56:12.634686 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Jan 30 13:56:12.634713 systemd[1]: var-lib-machines.mount - Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jan 30 13:56:12.634735 systemd[1]: Reached target machines.target - Containers. Jan 30 13:56:12.634758 systemd[1]: Starting flatcar-tmpfiles.service - Create missing system files... Jan 30 13:56:12.634779 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 30 13:56:12.634802 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Jan 30 13:56:12.634823 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Jan 30 13:56:12.634846 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jan 30 13:56:12.634868 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jan 30 13:56:12.634889 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jan 30 13:56:12.634916 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Jan 30 13:56:12.634939 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jan 30 13:56:12.634961 systemd[1]: setup-nsswitch.service - Create /etc/nsswitch.conf was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jan 30 13:56:12.634982 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 30 13:56:12.635005 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device. Jan 30 13:56:12.635027 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jan 30 13:56:12.635047 systemd[1]: Stopped systemd-fsck-usr.service. Jan 30 13:56:12.635069 systemd[1]: Starting systemd-journald.service - Journal Service... Jan 30 13:56:12.635096 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Jan 30 13:56:12.635117 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Jan 30 13:56:12.635137 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Jan 30 13:56:12.635157 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Jan 30 13:56:12.635177 systemd[1]: verity-setup.service: Deactivated successfully. Jan 30 13:56:12.635196 systemd[1]: Stopped verity-setup.service. Jan 30 13:56:12.635218 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 30 13:56:12.636297 systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Jan 30 13:56:12.636340 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Jan 30 13:56:12.636369 systemd[1]: Mounted media.mount - External Media Directory. Jan 30 13:56:12.636395 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Jan 30 13:56:12.636420 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Jan 30 13:56:12.636442 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Jan 30 13:56:12.636467 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Jan 30 13:56:12.636497 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 30 13:56:12.636522 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Jan 30 13:56:12.636544 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jan 30 13:56:12.636569 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jan 30 13:56:12.636591 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jan 30 13:56:12.636615 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jan 30 13:56:12.636638 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Jan 30 13:56:12.636663 systemd[1]: Reached target network-pre.target - Preparation for Network. Jan 30 13:56:12.636693 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Jan 30 13:56:12.636719 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully... Jan 30 13:56:12.636744 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Jan 30 13:56:12.636769 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Jan 30 13:56:12.636793 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Jan 30 13:56:12.636816 systemd[1]: remount-root.service - Remount Root File System was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jan 30 13:56:12.636843 systemd[1]: Reached target local-fs.target - Local File Systems. Jan 30 13:56:12.636869 systemd[1]: Listening on systemd-sysext.socket - System Extension Image Management (Varlink). Jan 30 13:56:12.636936 systemd-journald[1537]: Collecting audit messages is disabled. Jan 30 13:56:12.636981 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown... Jan 30 13:56:12.637006 kernel: ACPI: bus type drm_connector registered Jan 30 13:56:12.637031 systemd[1]: Starting ldconfig.service - Rebuild Dynamic Linker Cache... Jan 30 13:56:12.637057 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 30 13:56:12.637086 kernel: fuse: init (API version 7.39) Jan 30 13:56:12.637111 systemd[1]: Starting systemd-hwdb-update.service - Rebuild Hardware Database... Jan 30 13:56:12.637137 kernel: loop: module loaded Jan 30 13:56:12.637160 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jan 30 13:56:12.637184 systemd[1]: Starting systemd-random-seed.service - Load/Save OS Random Seed... Jan 30 13:56:12.637210 systemd-journald[1537]: Journal started Jan 30 13:56:12.646653 systemd-journald[1537]: Runtime Journal (/run/log/journal/ec2df8485e43c537d6435d556a7973a9) is 4.8M, max 38.6M, 33.7M free. Jan 30 13:56:12.646770 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Jan 30 13:56:12.646817 systemd[1]: Starting systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/... Jan 30 13:56:11.974028 systemd[1]: Queued start job for default target multi-user.target. Jan 30 13:56:12.651398 systemd[1]: Finished flatcar-tmpfiles.service - Create missing system files. Jan 30 13:56:12.651463 systemd[1]: Started systemd-journald.service - Journal Service. Jan 30 13:56:11.998808 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device - /dev/nvme0n1p6. Jan 30 13:56:11.999268 systemd[1]: systemd-journald.service: Deactivated successfully. Jan 30 13:56:12.659118 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 30 13:56:12.660314 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jan 30 13:56:12.662110 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 30 13:56:12.662324 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Jan 30 13:56:12.664154 systemd[1]: modprobe@loop.service: Deactivated successfully. Jan 30 13:56:12.664447 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jan 30 13:56:12.667549 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown. Jan 30 13:56:12.734263 kernel: loop0: detected capacity change from 0 to 61336 Jan 30 13:56:12.736395 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Jan 30 13:56:12.749847 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Jan 30 13:56:12.754231 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jan 30 13:56:12.755464 systemd[1]: Finished systemd-random-seed.service - Load/Save OS Random Seed. Jan 30 13:56:12.776192 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Jan 30 13:56:12.779472 systemd[1]: Reached target first-boot-complete.target - First Boot Complete. Jan 30 13:56:12.824470 systemd[1]: Starting systemd-machine-id-commit.service - Commit a transient machine-id on disk... Jan 30 13:56:12.833490 systemd-journald[1537]: Time spent on flushing to /var/log/journal/ec2df8485e43c537d6435d556a7973a9 is 145.902ms for 962 entries. Jan 30 13:56:12.833490 systemd-journald[1537]: System Journal (/var/log/journal/ec2df8485e43c537d6435d556a7973a9) is 8.0M, max 195.6M, 187.6M free. Jan 30 13:56:13.012052 systemd-journald[1537]: Received client request to flush runtime journal. Jan 30 13:56:13.012129 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jan 30 13:56:13.012170 kernel: loop1: detected capacity change from 0 to 142488 Jan 30 13:56:12.837776 systemd-tmpfiles[1550]: ACLs are not supported, ignoring. Jan 30 13:56:12.837800 systemd-tmpfiles[1550]: ACLs are not supported, ignoring. Jan 30 13:56:12.859174 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Jan 30 13:56:12.874076 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Jan 30 13:56:12.918516 systemd[1]: Starting systemd-sysusers.service - Create System Users... Jan 30 13:56:12.952862 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Jan 30 13:56:12.963457 systemd[1]: Starting systemd-udev-settle.service - Wait for udev To Complete Device Initialization... Jan 30 13:56:13.020809 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Jan 30 13:56:13.047276 udevadm[1593]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jan 30 13:56:13.073641 systemd[1]: Finished systemd-sysusers.service - Create System Users. Jan 30 13:56:13.078931 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jan 30 13:56:13.080085 systemd[1]: Finished systemd-machine-id-commit.service - Commit a transient machine-id on disk. Jan 30 13:56:13.092359 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Jan 30 13:56:13.140265 kernel: loop2: detected capacity change from 0 to 140768 Jan 30 13:56:13.168876 systemd-tmpfiles[1600]: ACLs are not supported, ignoring. Jan 30 13:56:13.168907 systemd-tmpfiles[1600]: ACLs are not supported, ignoring. Jan 30 13:56:13.208308 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Jan 30 13:56:13.256259 kernel: loop3: detected capacity change from 0 to 61336 Jan 30 13:56:13.295269 kernel: loop4: detected capacity change from 0 to 142488 Jan 30 13:56:13.339277 kernel: loop5: detected capacity change from 0 to 140768 Jan 30 13:56:13.381665 (sd-merge)[1606]: Using extensions 'containerd-flatcar', 'docker-flatcar', 'oem-ami'. Jan 30 13:56:13.384227 (sd-merge)[1606]: Merged extensions into '/usr'. Jan 30 13:56:13.392546 systemd[1]: Finished systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/. Jan 30 13:56:13.408461 systemd[1]: Starting ensure-sysext.service... Jan 30 13:56:13.422901 systemd[1]: Starting systemd-tmpfiles-setup.service - Create System Files and Directories... Jan 30 13:56:13.450429 systemd[1]: Reloading requested from client PID 1608 ('systemctl') (unit ensure-sysext.service)... Jan 30 13:56:13.450450 systemd[1]: Reloading... Jan 30 13:56:13.509581 systemd-tmpfiles[1609]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jan 30 13:56:13.520609 systemd-tmpfiles[1609]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Jan 30 13:56:13.529589 systemd-tmpfiles[1609]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jan 30 13:56:13.530110 systemd-tmpfiles[1609]: ACLs are not supported, ignoring. Jan 30 13:56:13.530207 systemd-tmpfiles[1609]: ACLs are not supported, ignoring. Jan 30 13:56:13.537359 systemd-tmpfiles[1609]: Detected autofs mount point /boot during canonicalization of boot. Jan 30 13:56:13.537669 systemd-tmpfiles[1609]: Skipping /boot Jan 30 13:56:13.612159 systemd-tmpfiles[1609]: Detected autofs mount point /boot during canonicalization of boot. Jan 30 13:56:13.612183 systemd-tmpfiles[1609]: Skipping /boot Jan 30 13:56:13.687283 zram_generator::config[1637]: No configuration found. Jan 30 13:56:14.146351 ldconfig[1556]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jan 30 13:56:14.152881 systemd[1]: /usr/lib/systemd/system/docker.socket:6: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jan 30 13:56:14.315868 systemd[1]: Reloading finished in 864 ms. Jan 30 13:56:14.373993 systemd[1]: Finished ldconfig.service - Rebuild Dynamic Linker Cache. Jan 30 13:56:14.386525 systemd[1]: Finished systemd-tmpfiles-setup.service - Create System Files and Directories. Jan 30 13:56:14.409509 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Jan 30 13:56:14.446647 systemd[1]: Starting clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs... Jan 30 13:56:14.454596 systemd[1]: Starting systemd-journal-catalog-update.service - Rebuild Journal Catalog... Jan 30 13:56:14.463582 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Jan 30 13:56:14.468968 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Jan 30 13:56:14.494854 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 30 13:56:14.495174 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 30 13:56:14.525642 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Jan 30 13:56:14.533458 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Jan 30 13:56:14.543129 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Jan 30 13:56:14.544632 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 30 13:56:14.544827 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 30 13:56:14.556862 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Jan 30 13:56:14.560927 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 30 13:56:14.561222 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 30 13:56:14.562531 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 30 13:56:14.562680 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 30 13:56:14.590049 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 30 13:56:14.597055 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Jan 30 13:56:14.608087 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Jan 30 13:56:14.609808 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 30 13:56:14.610182 systemd[1]: Reached target time-set.target - System Time Set. Jan 30 13:56:14.611718 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Jan 30 13:56:14.613957 systemd[1]: Finished ensure-sysext.service. Jan 30 13:56:14.631548 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Jan 30 13:56:14.717692 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 30 13:56:14.717899 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Jan 30 13:56:14.729181 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jan 30 13:56:14.730768 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Jan 30 13:56:14.736669 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jan 30 13:56:14.736875 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Jan 30 13:56:14.739651 systemd[1]: modprobe@loop.service: Deactivated successfully. Jan 30 13:56:14.740051 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Jan 30 13:56:14.744345 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jan 30 13:56:14.744432 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Jan 30 13:56:14.751810 systemd[1]: Finished systemd-journal-catalog-update.service - Rebuild Journal Catalog. Jan 30 13:56:14.773693 systemd[1]: Finished clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs. Jan 30 13:56:14.775900 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jan 30 13:56:14.795098 systemd[1]: Started systemd-userdbd.service - User Database Manager. Jan 30 13:56:14.800708 augenrules[1721]: No rules Jan 30 13:56:14.805827 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Jan 30 13:56:14.898970 systemd-resolved[1693]: Positive Trust Anchors: Jan 30 13:56:14.898993 systemd-resolved[1693]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 30 13:56:14.899041 systemd-resolved[1693]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 170.0.0.192.in-addr.arpa 171.0.0.192.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa ipv4only.arpa resolver.arpa corp home internal intranet lan local private test Jan 30 13:56:14.905818 systemd-resolved[1693]: Defaulting to hostname 'linux'. Jan 30 13:56:14.908792 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Jan 30 13:56:14.910277 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Jan 30 13:56:15.006328 systemd[1]: Finished systemd-hwdb-update.service - Rebuild Hardware Database. Jan 30 13:56:15.013487 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Jan 30 13:56:15.022411 systemd[1]: Starting systemd-update-done.service - Update is Completed... Jan 30 13:56:15.043136 systemd[1]: Finished systemd-update-done.service - Update is Completed. Jan 30 13:56:15.058113 systemd-udevd[1733]: Using default interface naming scheme 'v255'. Jan 30 13:56:15.097905 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Jan 30 13:56:15.114682 systemd[1]: Starting systemd-networkd.service - Network Configuration... Jan 30 13:56:15.199335 systemd[1]: Condition check resulted in dev-ttyS0.device - /dev/ttyS0 being skipped. Jan 30 13:56:15.265411 systemd-networkd[1741]: lo: Link UP Jan 30 13:56:15.265423 systemd-networkd[1741]: lo: Gained carrier Jan 30 13:56:15.267951 systemd-networkd[1741]: Enumeration completed Jan 30 13:56:15.268112 systemd[1]: Started systemd-networkd.service - Network Configuration. Jan 30 13:56:15.270060 systemd[1]: Reached target network.target - Network. Jan 30 13:56:15.282514 systemd[1]: Starting systemd-networkd-wait-online.service - Wait for Network to be Configured... Jan 30 13:56:15.288610 (udev-worker)[1749]: Network interface NamePolicy= disabled on kernel command line. Jan 30 13:56:15.358505 systemd-networkd[1741]: eth0: found matching network '/usr/lib/systemd/network/zz-default.network', based on potentially unpredictable interface name. Jan 30 13:56:15.358523 systemd-networkd[1741]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jan 30 13:56:15.366083 systemd-networkd[1741]: eth0: Link UP Jan 30 13:56:15.366345 systemd-networkd[1741]: eth0: Gained carrier Jan 30 13:56:15.366383 systemd-networkd[1741]: eth0: found matching network '/usr/lib/systemd/network/zz-default.network', based on potentially unpredictable interface name. Jan 30 13:56:15.377753 systemd-networkd[1741]: eth0: DHCPv4 address 172.31.21.135/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jan 30 13:56:15.399283 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Jan 30 13:56:15.405655 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Jan 30 13:56:15.432497 kernel: ACPI: button: Power Button [PWRF] Jan 30 13:56:15.432526 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Jan 30 13:56:15.432552 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Jan 30 13:56:15.432574 kernel: BTRFS warning: duplicate device /dev/nvme0n1p3 devid 1 generation 38 scanned by (udev-worker) (1746) Jan 30 13:56:15.444261 kernel: ACPI: button: Sleep Button [SLPF] Jan 30 13:56:15.508824 kernel: mousedev: PS/2 mouse device common for all mice Jan 30 13:56:15.507489 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Jan 30 13:56:15.655728 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Amazon Elastic Block Store OEM. Jan 30 13:56:15.767572 systemd[1]: Finished systemd-udev-settle.service - Wait for udev To Complete Device Initialization. Jan 30 13:56:15.776632 systemd[1]: Starting lvm2-activation-early.service - Activation of LVM2 logical volumes... Jan 30 13:56:15.782274 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM... Jan 30 13:56:15.784421 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Jan 30 13:56:15.799397 lvm[1853]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 30 13:56:15.822437 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM. Jan 30 13:56:15.832725 systemd[1]: Finished lvm2-activation-early.service - Activation of LVM2 logical volumes. Jan 30 13:56:15.835854 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Jan 30 13:56:15.837629 systemd[1]: Reached target sysinit.target - System Initialization. Jan 30 13:56:15.839667 systemd[1]: Started motdgen.path - Watch for update engine configuration changes. Jan 30 13:56:15.841566 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path - Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jan 30 13:56:15.843610 systemd[1]: Started logrotate.timer - Daily rotation of log files. Jan 30 13:56:15.845341 systemd[1]: Started mdadm.timer - Weekly check for MD array's redundancy information.. Jan 30 13:56:15.846867 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Jan 30 13:56:15.848605 systemd[1]: update-engine-stub.timer - Update Engine Stub Timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jan 30 13:56:15.848645 systemd[1]: Reached target paths.target - Path Units. Jan 30 13:56:15.849999 systemd[1]: Reached target timers.target - Timer Units. Jan 30 13:56:15.852193 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Jan 30 13:56:15.855194 systemd[1]: Starting docker.socket - Docker Socket for the API... Jan 30 13:56:15.862763 systemd[1]: Listening on sshd.socket - OpenSSH Server Socket. Jan 30 13:56:15.867417 systemd[1]: Starting lvm2-activation.service - Activation of LVM2 logical volumes... Jan 30 13:56:15.874925 systemd[1]: Listening on docker.socket - Docker Socket for the API. Jan 30 13:56:15.882833 systemd[1]: Reached target sockets.target - Socket Units. Jan 30 13:56:15.888785 systemd[1]: Reached target basic.target - Basic System. Jan 30 13:56:15.890617 systemd[1]: addon-config@oem.service - Configure Addon /oem was skipped because no trigger condition checks were met. Jan 30 13:56:15.891113 systemd[1]: addon-run@oem.service - Run Addon /oem was skipped because no trigger condition checks were met. Jan 30 13:56:15.899461 systemd[1]: Starting containerd.service - containerd container runtime... Jan 30 13:56:15.906816 lvm[1862]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 30 13:56:15.913585 systemd[1]: Starting coreos-metadata.service - Flatcar Metadata Agent... Jan 30 13:56:15.923830 systemd[1]: Starting dbus.service - D-Bus System Message Bus... Jan 30 13:56:15.928562 systemd[1]: Starting enable-oem-cloudinit.service - Enable cloudinit... Jan 30 13:56:15.939830 systemd[1]: Starting extend-filesystems.service - Extend Filesystems... Jan 30 13:56:15.941463 systemd[1]: flatcar-setup-environment.service - Modifies /etc/environment for CoreOS was skipped because of an unmet condition check (ConditionPathExists=/oem/bin/flatcar-setup-environment). Jan 30 13:56:15.944225 systemd[1]: Starting motdgen.service - Generate /run/flatcar/motd... Jan 30 13:56:15.959525 systemd[1]: Started ntpd.service - Network Time Service. Jan 30 13:56:15.976882 systemd[1]: Starting setup-oem.service - Setup OEM... Jan 30 13:56:15.999615 systemd[1]: Starting ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline... Jan 30 13:56:16.013420 systemd[1]: Starting sshd-keygen.service - Generate sshd host keys... Jan 30 13:56:16.050504 systemd[1]: Starting systemd-logind.service - User Login Management... Jan 30 13:56:16.052789 systemd[1]: tcsd.service - TCG Core Services Daemon was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jan 30 13:56:16.054706 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jan 30 13:56:16.063594 systemd[1]: Starting update-engine.service - Update Engine... Jan 30 13:56:16.073493 systemd[1]: Starting update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition... Jan 30 13:56:16.095887 systemd[1]: Finished lvm2-activation.service - Activation of LVM2 logical volumes. Jan 30 13:56:16.108638 systemd[1]: Created slice system-sshd.slice - Slice /system/sshd. Jan 30 13:56:16.143598 jq[1866]: false Jan 30 13:56:16.143943 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jan 30 13:56:16.144379 systemd[1]: Condition check resulted in enable-oem-cloudinit.service - Enable cloudinit being skipped. Jan 30 13:56:16.168843 systemd[1]: motdgen.service: Deactivated successfully. Jan 30 13:56:16.169189 systemd[1]: Finished motdgen.service - Generate /run/flatcar/motd. Jan 30 13:56:16.173846 jq[1881]: true Jan 30 13:56:16.179486 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jan 30 13:56:16.179944 systemd[1]: Finished ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline. Jan 30 13:56:16.187281 extend-filesystems[1867]: Found loop3 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found loop4 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found loop5 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found nvme0n1 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found nvme0n1p1 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found nvme0n1p2 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found nvme0n1p3 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found usr Jan 30 13:56:16.196401 extend-filesystems[1867]: Found nvme0n1p4 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found nvme0n1p6 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found nvme0n1p7 Jan 30 13:56:16.196401 extend-filesystems[1867]: Found nvme0n1p9 Jan 30 13:56:16.196401 extend-filesystems[1867]: Checking size of /dev/nvme0n1p9 Jan 30 13:56:16.198188 systemd[1]: Started dbus.service - D-Bus System Message Bus. Jan 30 13:56:16.197196 dbus-daemon[1865]: [system] SELinux support is enabled Jan 30 13:56:16.220597 ntpd[1869]: ntpd 4.2.8p17@1.4004-o Wed Jan 29 09:31:52 UTC 2025 (1): Starting Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: ntpd 4.2.8p17@1.4004-o Wed Jan 29 09:31:52 UTC 2025 (1): Starting Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: Command line: /usr/sbin/ntpd -g -n -u ntp:ntp Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: ---------------------------------------------------- Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: ntp-4 is maintained by Network Time Foundation, Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: Inc. (NTF), a non-profit 501(c)(3) public-benefit Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: corporation. Support and training for ntp-4 are Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: available at https://www.nwtime.org/support Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: ---------------------------------------------------- Jan 30 13:56:16.231905 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: proto: precision = 0.075 usec (-24) Jan 30 13:56:16.220623 ntpd[1869]: Command line: /usr/sbin/ntpd -g -n -u ntp:ntp Jan 30 13:56:16.232859 jq[1900]: true Jan 30 13:56:16.220634 ntpd[1869]: ---------------------------------------------------- Jan 30 13:56:16.256592 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: basedate set to 2025-01-17 Jan 30 13:56:16.256592 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: gps base set to 2025-01-19 (week 2350) Jan 30 13:56:16.250972 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service - Load cloud-config from /usr/share/oem/cloud-config.yml was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jan 30 13:56:16.220644 ntpd[1869]: ntp-4 is maintained by Network Time Foundation, Jan 30 13:56:16.251025 systemd[1]: Reached target system-config.target - Load system-provided cloud configs. Jan 30 13:56:16.220655 ntpd[1869]: Inc. (NTF), a non-profit 501(c)(3) public-benefit Jan 30 13:56:16.253753 systemd[1]: user-cloudinit-proc-cmdline.service - Load cloud-config from url defined in /proc/cmdline was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jan 30 13:56:16.220664 ntpd[1869]: corporation. Support and training for ntp-4 are Jan 30 13:56:16.253780 systemd[1]: Reached target user-config.target - Load user-provided cloud configs. Jan 30 13:56:16.220674 ntpd[1869]: available at https://www.nwtime.org/support Jan 30 13:56:16.220685 ntpd[1869]: ---------------------------------------------------- Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.258 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.259 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/instance-id: Attempt #1 Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.259 INFO Fetch successful Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.259 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/instance-type: Attempt #1 Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.260 INFO Fetch successful Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.260 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/local-ipv4: Attempt #1 Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.262 INFO Fetch successful Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.262 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/public-ipv4: Attempt #1 Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.262 INFO Fetch successful Jan 30 13:56:16.264060 coreos-metadata[1864]: Jan 30 13:56:16.262 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/ipv6: Attempt #1 Jan 30 13:56:16.228427 dbus-daemon[1865]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1741 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jan 30 13:56:16.277360 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: Listen and drop on 0 v6wildcard [::]:123 Jan 30 13:56:16.277360 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: Listen and drop on 1 v4wildcard 0.0.0.0:123 Jan 30 13:56:16.277360 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: Listen normally on 2 lo 127.0.0.1:123 Jan 30 13:56:16.277360 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: Listen normally on 3 eth0 172.31.21.135:123 Jan 30 13:56:16.277360 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: Listen normally on 4 lo [::1]:123 Jan 30 13:56:16.277360 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: bind(21) AF_INET6 fe80::460:7fff:fefb:713b%2#123 flags 0x11 failed: Cannot assign requested address Jan 30 13:56:16.277360 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: unable to create socket on eth0 (5) for fe80::460:7fff:fefb:713b%2#123 Jan 30 13:56:16.277360 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: failed to init interface for address fe80::460:7fff:fefb:713b%2 Jan 30 13:56:16.287118 coreos-metadata[1864]: Jan 30 13:56:16.271 INFO Fetch failed with 404: resource not found Jan 30 13:56:16.287118 coreos-metadata[1864]: Jan 30 13:56:16.271 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/placement/availability-zone: Attempt #1 Jan 30 13:56:16.287118 coreos-metadata[1864]: Jan 30 13:56:16.276 INFO Fetch successful Jan 30 13:56:16.287118 coreos-metadata[1864]: Jan 30 13:56:16.276 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/placement/availability-zone-id: Attempt #1 Jan 30 13:56:16.287118 coreos-metadata[1864]: Jan 30 13:56:16.282 INFO Fetch successful Jan 30 13:56:16.287118 coreos-metadata[1864]: Jan 30 13:56:16.282 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/hostname: Attempt #1 Jan 30 13:56:16.229003 ntpd[1869]: proto: precision = 0.075 usec (-24) Jan 30 13:56:16.287441 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: Listening on routing socket on fd #21 for interface updates Jan 30 13:56:16.286604 systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Jan 30 13:56:16.244546 ntpd[1869]: basedate set to 2025-01-17 Jan 30 13:56:16.244572 ntpd[1869]: gps base set to 2025-01-19 (week 2350) Jan 30 13:56:16.294072 coreos-metadata[1864]: Jan 30 13:56:16.288 INFO Fetch successful Jan 30 13:56:16.294072 coreos-metadata[1864]: Jan 30 13:56:16.288 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/public-hostname: Attempt #1 Jan 30 13:56:16.294072 coreos-metadata[1864]: Jan 30 13:56:16.293 INFO Fetch successful Jan 30 13:56:16.294072 coreos-metadata[1864]: Jan 30 13:56:16.293 INFO Fetching http://169.254.169.254/2021-01-03/dynamic/instance-identity/document: Attempt #1 Jan 30 13:56:16.254547 dbus-daemon[1865]: [system] Successfully activated service 'org.freedesktop.systemd1' Jan 30 13:56:16.294325 coreos-metadata[1864]: Jan 30 13:56:16.294 INFO Fetch successful Jan 30 13:56:16.276796 ntpd[1869]: Listen and drop on 0 v6wildcard [::]:123 Jan 30 13:56:16.276851 ntpd[1869]: Listen and drop on 1 v4wildcard 0.0.0.0:123 Jan 30 13:56:16.277050 ntpd[1869]: Listen normally on 2 lo 127.0.0.1:123 Jan 30 13:56:16.277179 ntpd[1869]: Listen normally on 3 eth0 172.31.21.135:123 Jan 30 13:56:16.277228 ntpd[1869]: Listen normally on 4 lo [::1]:123 Jan 30 13:56:16.277305 ntpd[1869]: bind(21) AF_INET6 fe80::460:7fff:fefb:713b%2#123 flags 0x11 failed: Cannot assign requested address Jan 30 13:56:16.277327 ntpd[1869]: unable to create socket on eth0 (5) for fe80::460:7fff:fefb:713b%2#123 Jan 30 13:56:16.277342 ntpd[1869]: failed to init interface for address fe80::460:7fff:fefb:713b%2 Jan 30 13:56:16.277375 ntpd[1869]: Listening on routing socket on fd #21 for interface updates Jan 30 13:56:16.295368 ntpd[1869]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jan 30 13:56:16.311442 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jan 30 13:56:16.311442 ntpd[1869]: 30 Jan 13:56:16 ntpd[1869]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jan 30 13:56:16.295403 ntpd[1869]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized Jan 30 13:56:16.319269 extend-filesystems[1867]: Resized partition /dev/nvme0n1p9 Jan 30 13:56:16.325066 update_engine[1879]: I20250130 13:56:16.324573 1879 main.cc:92] Flatcar Update Engine starting Jan 30 13:56:16.326634 extend-filesystems[1917]: resize2fs 1.47.1 (20-May-2024) Jan 30 13:56:16.339916 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Jan 30 13:56:16.337014 (ntainerd)[1902]: containerd.service: Referenced but unset environment variable evaluates to an empty string: TORCX_IMAGEDIR, TORCX_UNPACKDIR Jan 30 13:56:16.344216 update_engine[1879]: I20250130 13:56:16.332691 1879 update_check_scheduler.cc:74] Next update check in 7m7s Jan 30 13:56:16.338041 systemd[1]: Finished setup-oem.service - Setup OEM. Jan 30 13:56:16.349200 systemd[1]: Started update-engine.service - Update Engine. Jan 30 13:56:16.379081 systemd[1]: Started locksmithd.service - Cluster reboot manager. Jan 30 13:56:16.469021 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Jan 30 13:56:16.495087 systemd[1]: extend-filesystems.service: Deactivated successfully. Jan 30 13:56:16.496956 extend-filesystems[1917]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Jan 30 13:56:16.496956 extend-filesystems[1917]: old_desc_blocks = 1, new_desc_blocks = 1 Jan 30 13:56:16.496956 extend-filesystems[1917]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Jan 30 13:56:16.495455 systemd[1]: Finished extend-filesystems.service - Extend Filesystems. Jan 30 13:56:16.497722 extend-filesystems[1867]: Resized filesystem in /dev/nvme0n1p9 Jan 30 13:56:16.502019 systemd[1]: Finished coreos-metadata.service - Flatcar Metadata Agent. Jan 30 13:56:16.505737 systemd[1]: packet-phone-home.service - Report Success to Packet was skipped because no trigger condition checks were met. Jan 30 13:56:16.511770 systemd-logind[1878]: Watching system buttons on /dev/input/event1 (Power Button) Jan 30 13:56:16.512992 systemd-logind[1878]: Watching system buttons on /dev/input/event2 (Sleep Button) Jan 30 13:56:16.513129 systemd-logind[1878]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jan 30 13:56:16.514542 bash[1937]: Updated "/home/core/.ssh/authorized_keys" Jan 30 13:56:16.516694 systemd[1]: Finished update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition. Jan 30 13:56:16.517464 systemd-logind[1878]: New seat seat0. Jan 30 13:56:16.518831 systemd[1]: Started systemd-logind.service - User Login Management. Jan 30 13:56:16.534403 systemd[1]: Starting sshkeys.service... Jan 30 13:56:16.645481 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice - Slice /system/coreos-metadata-sshkeys. Jan 30 13:56:16.654780 systemd[1]: Starting coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys)... Jan 30 13:56:16.672423 systemd-networkd[1741]: eth0: Gained IPv6LL Jan 30 13:56:16.678418 systemd[1]: Finished systemd-networkd-wait-online.service - Wait for Network to be Configured. Jan 30 13:56:16.680841 systemd[1]: Reached target network-online.target - Network is Online. Jan 30 13:56:16.694274 kernel: BTRFS warning: duplicate device /dev/nvme0n1p3 devid 1 generation 38 scanned by (udev-worker) (1738) Jan 30 13:56:16.695471 systemd[1]: Started amazon-ssm-agent.service - amazon-ssm-agent. Jan 30 13:56:16.710473 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Jan 30 13:56:16.735745 systemd[1]: Starting nvidia.service - NVIDIA Configure Service... Jan 30 13:56:16.755970 (-wrapper)[1958]: etcd-member.service: Referenced but unset environment variable evaluates to an empty string: ETCD_OPTS Jan 30 13:56:16.945126 systemd[1]: Finished nvidia.service - NVIDIA Configure Service. Jan 30 13:56:16.984269 dbus-daemon[1865]: [system] Successfully activated service 'org.freedesktop.hostname1' Jan 30 13:56:16.984495 systemd[1]: Started systemd-hostnamed.service - Hostname Service. Jan 30 13:56:17.000341 dbus-daemon[1865]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1911 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jan 30 13:56:17.042796 systemd[1]: Starting polkit.service - Authorization Manager... Jan 30 13:56:17.175012 polkitd[2016]: Started polkitd version 121 Jan 30 13:56:17.194653 amazon-ssm-agent[1951]: Initializing new seelog logger Jan 30 13:56:17.203399 amazon-ssm-agent[1951]: New Seelog Logger Creation Complete Jan 30 13:56:17.203399 amazon-ssm-agent[1951]: 2025/01/30 13:56:17 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jan 30 13:56:17.203399 amazon-ssm-agent[1951]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jan 30 13:56:17.203399 amazon-ssm-agent[1951]: 2025/01/30 13:56:17 processing appconfig overrides Jan 30 13:56:17.211341 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO Proxy environment variables: Jan 30 13:56:17.223876 amazon-ssm-agent[1951]: 2025/01/30 13:56:17 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jan 30 13:56:17.223876 amazon-ssm-agent[1951]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jan 30 13:56:17.223876 amazon-ssm-agent[1951]: 2025/01/30 13:56:17 processing appconfig overrides Jan 30 13:56:17.229362 amazon-ssm-agent[1951]: 2025/01/30 13:56:17 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jan 30 13:56:17.229362 amazon-ssm-agent[1951]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jan 30 13:56:17.229362 amazon-ssm-agent[1951]: 2025/01/30 13:56:17 processing appconfig overrides Jan 30 13:56:17.239617 polkitd[2016]: Loading rules from directory /etc/polkit-1/rules.d Jan 30 13:56:17.239707 polkitd[2016]: Loading rules from directory /usr/share/polkit-1/rules.d Jan 30 13:56:17.247276 polkitd[2016]: Finished loading, compiling and executing 2 rules Jan 30 13:56:17.257091 amazon-ssm-agent[1951]: 2025/01/30 13:56:17 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jan 30 13:56:17.257091 amazon-ssm-agent[1951]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jan 30 13:56:17.257091 amazon-ssm-agent[1951]: 2025/01/30 13:56:17 processing appconfig overrides Jan 30 13:56:17.272463 dbus-daemon[1865]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jan 30 13:56:17.272695 systemd[1]: Started polkit.service - Authorization Manager. Jan 30 13:56:17.275722 polkitd[2016]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jan 30 13:56:17.284947 coreos-metadata[1948]: Jan 30 13:56:17.284 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jan 30 13:56:17.292021 coreos-metadata[1948]: Jan 30 13:56:17.288 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/public-keys: Attempt #1 Jan 30 13:56:17.298028 coreos-metadata[1948]: Jan 30 13:56:17.297 INFO Fetch successful Jan 30 13:56:17.298028 coreos-metadata[1948]: Jan 30 13:56:17.297 INFO Fetching http://169.254.169.254/2021-01-03/meta-data/public-keys/0/openssh-key: Attempt #1 Jan 30 13:56:17.300154 coreos-metadata[1948]: Jan 30 13:56:17.299 INFO Fetch successful Jan 30 13:56:17.311386 unknown[1948]: wrote ssh authorized keys file for user: core Jan 30 13:56:17.329048 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO https_proxy: Jan 30 13:56:17.384200 update-ssh-keys[2061]: Updated "/home/core/.ssh/authorized_keys" Jan 30 13:56:17.384089 systemd[1]: Finished coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys). Jan 30 13:56:17.403580 systemd[1]: Finished sshkeys.service. Jan 30 13:56:17.430080 systemd-hostnamed[1911]: Hostname set to (transient) Jan 30 13:56:17.430625 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO http_proxy: Jan 30 13:56:17.430217 systemd-resolved[1693]: System hostname changed to 'ip-172-31-21-135'. Jan 30 13:56:17.462023 locksmithd[1924]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jan 30 13:56:17.531516 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO no_proxy: Jan 30 13:56:17.630712 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO Checking if agent identity type OnPrem can be assumed Jan 30 13:56:17.635503 containerd[1902]: time="2025-01-30T13:56:17.631789141Z" level=info msg="starting containerd" revision=174e0d1785eeda18dc2beba45e1d5a188771636b version=v1.7.21 Jan 30 13:56:17.685457 sshd_keygen[1909]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jan 30 13:56:17.730826 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO Checking if agent identity type EC2 can be assumed Jan 30 13:56:17.748786 systemd[1]: Finished sshd-keygen.service - Generate sshd host keys. Jan 30 13:56:17.756224 containerd[1902]: time="2025-01-30T13:56:17.755923668Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jan 30 13:56:17.758579 containerd[1902]: time="2025-01-30T13:56:17.758527980Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.6.74-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jan 30 13:56:17.758711 containerd[1902]: time="2025-01-30T13:56:17.758695246Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jan 30 13:56:17.758783 containerd[1902]: time="2025-01-30T13:56:17.758769609Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jan 30 13:56:17.759138 containerd[1902]: time="2025-01-30T13:56:17.759113784Z" level=info msg="loading plugin \"io.containerd.warning.v1.deprecations\"..." type=io.containerd.warning.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.759261735Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." type=io.containerd.snapshotter.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.759352926Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." error="no scratch file generator: skip plugin" type=io.containerd.snapshotter.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.759372653Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.759739854Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.759764952Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.759786149Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." error="devmapper not configured: skip plugin" type=io.containerd.snapshotter.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.759801992Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.759914677Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jan 30 13:56:17.760303 containerd[1902]: time="2025-01-30T13:56:17.760171305Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jan 30 13:56:17.761082 containerd[1902]: time="2025-01-30T13:56:17.761037597Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jan 30 13:56:17.761184 containerd[1902]: time="2025-01-30T13:56:17.761165234Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jan 30 13:56:17.761466 containerd[1902]: time="2025-01-30T13:56:17.761443084Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jan 30 13:56:17.761767 containerd[1902]: time="2025-01-30T13:56:17.761599173Z" level=info msg="metadata content store policy set" policy=shared Jan 30 13:56:17.770771 systemd[1]: Starting issuegen.service - Generate /run/issue... Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.773828279Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.773910797Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.773934373Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.773955548Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.773975693Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774164825Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774538939Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774690435Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774713267Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774731652Z" level=info msg="loading plugin \"io.containerd.sandbox.controller.v1.local\"..." type=io.containerd.sandbox.controller.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774752242Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774771753Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774794664Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jan 30 13:56:17.778272 containerd[1902]: time="2025-01-30T13:56:17.774814700Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774836186Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774856933Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774876738Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774894318Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774920953Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774939870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774960466Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774979381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.774996204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.775015354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.775031866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.775049489Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.775066479Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.778864 containerd[1902]: time="2025-01-30T13:56:17.775087052Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.779592 containerd[1902]: time="2025-01-30T13:56:17.775106659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.779592 containerd[1902]: time="2025-01-30T13:56:17.775124793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.779592 containerd[1902]: time="2025-01-30T13:56:17.775147336Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.779592 containerd[1902]: time="2025-01-30T13:56:17.775176928Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1 Jan 30 13:56:17.779592 containerd[1902]: time="2025-01-30T13:56:17.775208251Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.779592 containerd[1902]: time="2025-01-30T13:56:17.775224847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.779792 systemd[1]: Started sshd@0-172.31.21.135:22-139.178.68.195:51228.service - OpenSSH per-connection server daemon (139.178.68.195:51228). Jan 30 13:56:17.781417 containerd[1902]: time="2025-01-30T13:56:17.781221317Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jan 30 13:56:17.781617 containerd[1902]: time="2025-01-30T13:56:17.781598444Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jan 30 13:56:17.787807 containerd[1902]: time="2025-01-30T13:56:17.782374238Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="skip plugin: tracing endpoint not configured" type=io.containerd.tracing.processor.v1 Jan 30 13:56:17.787807 containerd[1902]: time="2025-01-30T13:56:17.782409258Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jan 30 13:56:17.787807 containerd[1902]: time="2025-01-30T13:56:17.782468127Z" level=info msg="skip loading plugin \"io.containerd.internal.v1.tracing\"..." error="skip plugin: tracing endpoint not configured" type=io.containerd.internal.v1 Jan 30 13:56:17.787807 containerd[1902]: time="2025-01-30T13:56:17.782488139Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.787807 containerd[1902]: time="2025-01-30T13:56:17.782510292Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1 Jan 30 13:56:17.787807 containerd[1902]: time="2025-01-30T13:56:17.782574362Z" level=info msg="NRI interface is disabled by configuration." Jan 30 13:56:17.787807 containerd[1902]: time="2025-01-30T13:56:17.782593295Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jan 30 13:56:17.791026 containerd[1902]: time="2025-01-30T13:56:17.789664658Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s ImagePullWithSyncFs:false IgnoreDeprecationWarnings:[]} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jan 30 13:56:17.791026 containerd[1902]: time="2025-01-30T13:56:17.789797651Z" level=info msg="Connect containerd service" Jan 30 13:56:17.791026 containerd[1902]: time="2025-01-30T13:56:17.789854322Z" level=info msg="using legacy CRI server" Jan 30 13:56:17.791026 containerd[1902]: time="2025-01-30T13:56:17.789864908Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Jan 30 13:56:17.791026 containerd[1902]: time="2025-01-30T13:56:17.790001540Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jan 30 13:56:17.798412 containerd[1902]: time="2025-01-30T13:56:17.798372160Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jan 30 13:56:17.798709 containerd[1902]: time="2025-01-30T13:56:17.798667129Z" level=info msg="Start subscribing containerd event" Jan 30 13:56:17.800334 containerd[1902]: time="2025-01-30T13:56:17.800303158Z" level=info msg="Start recovering state" Jan 30 13:56:17.801827 containerd[1902]: time="2025-01-30T13:56:17.800507364Z" level=info msg="Start event monitor" Jan 30 13:56:17.801827 containerd[1902]: time="2025-01-30T13:56:17.800530059Z" level=info msg="Start snapshots syncer" Jan 30 13:56:17.801827 containerd[1902]: time="2025-01-30T13:56:17.800543697Z" level=info msg="Start cni network conf syncer for default" Jan 30 13:56:17.801827 containerd[1902]: time="2025-01-30T13:56:17.800613760Z" level=info msg="Start streaming server" Jan 30 13:56:17.802541 containerd[1902]: time="2025-01-30T13:56:17.802517543Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jan 30 13:56:17.802788 containerd[1902]: time="2025-01-30T13:56:17.802769210Z" level=info msg=serving... address=/run/containerd/containerd.sock Jan 30 13:56:17.802968 containerd[1902]: time="2025-01-30T13:56:17.802953706Z" level=info msg="containerd successfully booted in 0.173122s" Jan 30 13:56:17.803062 systemd[1]: Started containerd.service - containerd container runtime. Jan 30 13:56:17.824923 systemd[1]: Starting docker.service - Docker Application Container Engine... Jan 30 13:56:17.833375 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO Agent will take identity from EC2 Jan 30 13:56:17.847278 (dockerd)[2101]: docker.service: Referenced but unset environment variable evaluates to an empty string: DOCKER_CGROUPS, DOCKER_OPTS, DOCKER_OPT_BIP, DOCKER_OPT_IPMASQ, DOCKER_OPT_MTU Jan 30 13:56:17.850533 systemd[1]: issuegen.service: Deactivated successfully. Jan 30 13:56:17.850792 systemd[1]: Finished issuegen.service - Generate /run/issue. Jan 30 13:56:17.867574 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Jan 30 13:56:17.932331 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [amazon-ssm-agent] using named pipe channel for IPC Jan 30 13:56:17.945726 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Jan 30 13:56:17.957682 systemd[1]: Started getty@tty1.service - Getty on tty1. Jan 30 13:56:17.984829 systemd[1]: Started serial-getty@ttyS0.service - Serial Getty on ttyS0. Jan 30 13:56:17.990666 systemd[1]: Reached target getty.target - Login Prompts. Jan 30 13:56:18.059515 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [amazon-ssm-agent] using named pipe channel for IPC Jan 30 13:56:18.146926 sshd[2100]: Accepted publickey for core from 139.178.68.195 port 51228 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:18.156484 sshd[2100]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:18.163904 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [amazon-ssm-agent] using named pipe channel for IPC Jan 30 13:56:18.181951 systemd[1]: Created slice user-500.slice - User Slice of UID 500. Jan 30 13:56:18.190031 systemd[1]: Starting user-runtime-dir@500.service - User Runtime Directory /run/user/500... Jan 30 13:56:18.203022 systemd-logind[1878]: New session 1 of user core. Jan 30 13:56:18.244827 systemd[1]: Finished user-runtime-dir@500.service - User Runtime Directory /run/user/500. Jan 30 13:56:18.263047 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [amazon-ssm-agent] amazon-ssm-agent - v3.2.0.0 Jan 30 13:56:18.262480 systemd[1]: Starting user@500.service - User Manager for UID 500... Jan 30 13:56:18.282217 (systemd)[2116]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jan 30 13:56:18.366282 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [amazon-ssm-agent] OS: linux, Arch: amd64 Jan 30 13:56:18.453329 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [amazon-ssm-agent] Starting Core Agent Jan 30 13:56:18.455419 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [amazon-ssm-agent] registrar detected. Attempting registration Jan 30 13:56:18.457311 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [Registrar] Starting registrar module Jan 30 13:56:18.457428 amazon-ssm-agent[1951]: 2025-01-30 13:56:17 INFO [EC2Identity] no registration info found for ec2 instance, attempting registration Jan 30 13:56:18.457529 amazon-ssm-agent[1951]: 2025-01-30 13:56:18 INFO [EC2Identity] EC2 registration was successful. Jan 30 13:56:18.457599 amazon-ssm-agent[1951]: 2025-01-30 13:56:18 INFO [CredentialRefresher] credentialRefresher has started Jan 30 13:56:18.457665 amazon-ssm-agent[1951]: 2025-01-30 13:56:18 INFO [CredentialRefresher] Starting credentials refresher loop Jan 30 13:56:18.457732 amazon-ssm-agent[1951]: 2025-01-30 13:56:18 INFO EC2RoleProvider Successfully connected with instance profile role credentials Jan 30 13:56:18.467341 amazon-ssm-agent[1951]: 2025-01-30 13:56:18 INFO [CredentialRefresher] Next credential rotation will be in 31.499841352 minutes Jan 30 13:56:18.567263 systemd[2116]: Queued start job for default target default.target. Jan 30 13:56:18.574506 systemd[2116]: Created slice app.slice - User Application Slice. Jan 30 13:56:18.574555 systemd[2116]: Reached target paths.target - Paths. Jan 30 13:56:18.574576 systemd[2116]: Reached target timers.target - Timers. Jan 30 13:56:18.576850 systemd[2116]: Starting dbus.socket - D-Bus User Message Bus Socket... Jan 30 13:56:18.605587 systemd[2116]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jan 30 13:56:18.605800 systemd[2116]: Reached target sockets.target - Sockets. Jan 30 13:56:18.605829 systemd[2116]: Reached target basic.target - Basic System. Jan 30 13:56:18.605999 systemd[1]: Started user@500.service - User Manager for UID 500. Jan 30 13:56:18.608319 systemd[2116]: Reached target default.target - Main User Target. Jan 30 13:56:18.608382 systemd[2116]: Startup finished in 312ms. Jan 30 13:56:18.614496 systemd[1]: Started session-1.scope - Session 1 of User core. Jan 30 13:56:18.665138 dockerd[2101]: time="2025-01-30T13:56:18.665071094Z" level=info msg="Starting up" Jan 30 13:56:18.778719 systemd[1]: Started sshd@1-172.31.21.135:22-139.178.68.195:49780.service - OpenSSH per-connection server daemon (139.178.68.195:49780). Jan 30 13:56:18.908142 dockerd[2101]: time="2025-01-30T13:56:18.908089219Z" level=info msg="Loading containers: start." Jan 30 13:56:18.982660 sshd[2137]: Accepted publickey for core from 139.178.68.195 port 49780 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:18.987307 sshd[2137]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:19.010400 systemd-logind[1878]: New session 2 of user core. Jan 30 13:56:19.017176 systemd[1]: Started session-2.scope - Session 2 of User core. Jan 30 13:56:19.176257 sshd[2137]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:19.187833 systemd-logind[1878]: Session 2 logged out. Waiting for processes to exit. Jan 30 13:56:19.187929 systemd[1]: sshd@1-172.31.21.135:22-139.178.68.195:49780.service: Deactivated successfully. Jan 30 13:56:19.193157 systemd[1]: session-2.scope: Deactivated successfully. Jan 30 13:56:19.209101 systemd-logind[1878]: Removed session 2. Jan 30 13:56:19.212886 systemd[1]: Started sshd@2-172.31.21.135:22-139.178.68.195:49790.service - OpenSSH per-connection server daemon (139.178.68.195:49790). Jan 30 13:56:19.221232 ntpd[1869]: Listen normally on 6 eth0 [fe80::460:7fff:fefb:713b%2]:123 Jan 30 13:56:19.227518 ntpd[1869]: 30 Jan 13:56:19 ntpd[1869]: Listen normally on 6 eth0 [fe80::460:7fff:fefb:713b%2]:123 Jan 30 13:56:19.234658 kernel: Initializing XFRM netlink socket Jan 30 13:56:19.266887 (udev-worker)[1751]: Network interface NamePolicy= disabled on kernel command line. Jan 30 13:56:19.355049 systemd-networkd[1741]: docker0: Link UP Jan 30 13:56:19.383134 dockerd[2101]: time="2025-01-30T13:56:19.383078859Z" level=info msg="Loading containers: done." Jan 30 13:56:19.433683 dockerd[2101]: time="2025-01-30T13:56:19.433564882Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jan 30 13:56:19.434104 dockerd[2101]: time="2025-01-30T13:56:19.433700506Z" level=info msg="Docker daemon" commit=061aa95809be396a6b5542618d8a34b02a21ff77 containerd-snapshotter=false storage-driver=overlay2 version=26.1.0 Jan 30 13:56:19.434261 dockerd[2101]: time="2025-01-30T13:56:19.434034368Z" level=info msg="Daemon has completed initialization" Jan 30 13:56:19.441276 sshd[2192]: Accepted publickey for core from 139.178.68.195 port 49790 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:19.445415 sshd[2192]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:19.452174 systemd-logind[1878]: New session 3 of user core. Jan 30 13:56:19.457476 systemd[1]: Started session-3.scope - Session 3 of User core. Jan 30 13:56:19.498232 amazon-ssm-agent[1951]: 2025-01-30 13:56:19 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker is not running, starting worker process Jan 30 13:56:19.543266 dockerd[2101]: time="2025-01-30T13:56:19.542305338Z" level=info msg="API listen on /run/docker.sock" Jan 30 13:56:19.542793 systemd[1]: Started docker.service - Docker Application Container Engine. Jan 30 13:56:19.547062 etcd-wrapper[1988]: Error response from daemon: No such container: etcd-member Jan 30 13:56:19.584322 etcd-wrapper[2264]: Error response from daemon: No such container: etcd-member Jan 30 13:56:19.597622 sshd[2192]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:19.611048 amazon-ssm-agent[1951]: 2025-01-30 13:56:19 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker (pid:2249) started Jan 30 13:56:19.616224 systemd[1]: sshd@2-172.31.21.135:22-139.178.68.195:49790.service: Deactivated successfully. Jan 30 13:56:19.616715 systemd-logind[1878]: Session 3 logged out. Waiting for processes to exit. Jan 30 13:56:19.623023 systemd[1]: session-3.scope: Deactivated successfully. Jan 30 13:56:19.627317 systemd-logind[1878]: Removed session 3. Jan 30 13:56:19.653122 etcd-wrapper[2283]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Jan 30 13:56:19.699639 amazon-ssm-agent[1951]: 2025-01-30 13:56:19 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] Monitor long running worker health every 60 seconds Jan 30 13:56:20.762822 etcd-wrapper[2283]: v3.5.0: Pulling from coreos/etcd Jan 30 13:56:21.161132 etcd-wrapper[2283]: 1813d21adc01: Pulling fs layer Jan 30 13:56:21.161132 etcd-wrapper[2283]: 6e96907ab677: Pulling fs layer Jan 30 13:56:21.161132 etcd-wrapper[2283]: 444ed0ea8673: Pulling fs layer Jan 30 13:56:21.161132 etcd-wrapper[2283]: 0fd2df5633f0: Pulling fs layer Jan 30 13:56:21.161132 etcd-wrapper[2283]: 8cc22b9456bb: Pulling fs layer Jan 30 13:56:21.161132 etcd-wrapper[2283]: 7ac70aecd290: Pulling fs layer Jan 30 13:56:21.161132 etcd-wrapper[2283]: 4b376c64dfe4: Pulling fs layer Jan 30 13:56:21.161132 etcd-wrapper[2283]: 0fd2df5633f0: Waiting Jan 30 13:56:21.161132 etcd-wrapper[2283]: 8cc22b9456bb: Waiting Jan 30 13:56:21.161132 etcd-wrapper[2283]: 7ac70aecd290: Waiting Jan 30 13:56:21.161132 etcd-wrapper[2283]: 4b376c64dfe4: Waiting Jan 30 13:56:21.533370 etcd-wrapper[2283]: 444ed0ea8673: Verifying Checksum Jan 30 13:56:21.534746 etcd-wrapper[2283]: 444ed0ea8673: Download complete Jan 30 13:56:21.554065 etcd-wrapper[2283]: 6e96907ab677: Verifying Checksum Jan 30 13:56:21.554065 etcd-wrapper[2283]: 6e96907ab677: Download complete Jan 30 13:56:21.755601 etcd-wrapper[2283]: 1813d21adc01: Verifying Checksum Jan 30 13:56:21.755601 etcd-wrapper[2283]: 1813d21adc01: Download complete Jan 30 13:56:21.958624 etcd-wrapper[2283]: 8cc22b9456bb: Verifying Checksum Jan 30 13:56:21.958624 etcd-wrapper[2283]: 8cc22b9456bb: Download complete Jan 30 13:56:21.960294 etcd-wrapper[2283]: 0fd2df5633f0: Verifying Checksum Jan 30 13:56:21.960384 etcd-wrapper[2283]: 0fd2df5633f0: Download complete Jan 30 13:56:22.019669 etcd-wrapper[2283]: 7ac70aecd290: Verifying Checksum Jan 30 13:56:22.019669 etcd-wrapper[2283]: 7ac70aecd290: Download complete Jan 30 13:56:22.201417 etcd-wrapper[2283]: 4b376c64dfe4: Verifying Checksum Jan 30 13:56:22.201956 etcd-wrapper[2283]: 4b376c64dfe4: Download complete Jan 30 13:56:23.183936 etcd-wrapper[2283]: 1813d21adc01: Pull complete Jan 30 13:56:24.198746 systemd-resolved[1693]: Clock change detected. Flushing caches. Jan 30 13:56:24.434853 systemd[1]: var-lib-docker-overlay2-7ceddb8b40ebfe34b2c76b08686b9b7ff871e4ede9930425bed0d468e0f4b19d-merged.mount: Deactivated successfully. Jan 30 13:56:24.576470 etcd-wrapper[2283]: 6e96907ab677: Pull complete Jan 30 13:56:24.875310 systemd[1]: var-lib-docker-overlay2-f274176c640b5deb82cba41a953bb602ce9ea3a221dcf494ceb982612803f260-merged.mount: Deactivated successfully. Jan 30 13:56:24.920778 etcd-wrapper[2283]: 444ed0ea8673: Pull complete Jan 30 13:56:25.202640 systemd[1]: var-lib-docker-overlay2-60166b4eda821444cc567f5b727192cbe210907f1aeaf97b6ca989f1e943d757-merged.mount: Deactivated successfully. Jan 30 13:56:25.226170 etcd-wrapper[2283]: 0fd2df5633f0: Pull complete Jan 30 13:56:25.273169 systemd[1]: var-lib-docker-overlay2-365ccdbf40ad3e6d029832308b2f13ed82acfadb0e00a52ce38623cdebfb81f8-merged.mount: Deactivated successfully. Jan 30 13:56:25.285994 etcd-wrapper[2283]: 8cc22b9456bb: Pull complete Jan 30 13:56:25.302314 systemd[1]: var-lib-docker-overlay2-79e946800efa3d478263698e7e8c667a88b0a06589648da0eb7ce61f1170a3b1-merged.mount: Deactivated successfully. Jan 30 13:56:25.309919 etcd-wrapper[2283]: 7ac70aecd290: Pull complete Jan 30 13:56:25.332828 etcd-wrapper[2283]: 4b376c64dfe4: Pull complete Jan 30 13:56:25.343526 etcd-wrapper[2283]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Jan 30 13:56:25.346334 etcd-wrapper[2283]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Jan 30 13:56:25.608665 containerd[1902]: time="2025-01-30T13:56:25.607631959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jan 30 13:56:25.608665 containerd[1902]: time="2025-01-30T13:56:25.607740748Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jan 30 13:56:25.608665 containerd[1902]: time="2025-01-30T13:56:25.607776246Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:25.610145 containerd[1902]: time="2025-01-30T13:56:25.609984390Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:25.637120 systemd[1]: Started docker-16b057d0304fe8b66625c328a086cc76a6ca966689fd0a72b365a1b638cb7016.scope - libcontainer container 16b057d0304fe8b66625c328a086cc76a6ca966689fd0a72b365a1b638cb7016. Jan 30 13:56:25.699970 etcd-wrapper[2283]: {"level":"info","ts":1738245385.6996746,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jan 30 13:56:25.701496 etcd-wrapper[2283]: {"level":"info","ts":1738245385.6999807,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"ec2df8485e43c537d6435d556a7973a9"} Jan 30 13:56:25.701496 etcd-wrapper[2283]: {"level":"warn","ts":1738245385.700099,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jan 30 13:56:25.701496 etcd-wrapper[2283]: {"level":"warn","ts":1738245385.7001119,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jan 30 13:56:25.701496 etcd-wrapper[2283]: {"level":"warn","ts":1738245385.700119,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jan 30 13:56:25.701496 etcd-wrapper[2283]: {"level":"warn","ts":1738245385.7001252,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jan 30 13:56:25.701496 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:25.700Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://172.31.21.135:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://172.31.21.135:2380","--advertise-client-urls=http://172.31.21.135:2379","--discovery=https://discovery.etcd.io/9a211bf92c11c6496b4e208ee417249a","--enable-v2=true"]} Jan 30 13:56:25.701496 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:25.700Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://172.31.21.135:2380"]} Jan 30 13:56:25.701496 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:25.700Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Jan 30 13:56:25.701876 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:25.700Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":2,"max-cpu-available":2,"member-initialized":false,"name":"ec2df8485e43c537d6435d556a7973a9","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://172.31.21.135:2380"],"listen-peer-urls":["http://172.31.21.135:2380"],"advertise-client-urls":["http://172.31.21.135:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"ec2df8485e43c537d6435d556a7973a9=http://172.31.21.135:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/9a211bf92c11c6496b4e208ee417249a","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/9a211bf92c11c6496b4e208ee417249a","discovery-proxy":"","downgrade-check-interval":"5s"} Jan 30 13:56:25.704427 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:25.703Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"2.776084ms"} Jan 30 13:56:26.349904 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.349Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.350437 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.349Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"8afdd45dfef98e56"} Jan 30 13:56:26.350437 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.349Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Jan 30 13:56:26.501044 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.500Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"d3302519065413e2"} Jan 30 13:56:26.501044 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.500Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Jan 30 13:56:26.515328 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.514Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8afdd45dfef98e56","cluster-id":"3d06b4668b670fe3"} Jan 30 13:56:26.515594 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.514Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=()"} Jan 30 13:56:26.515594 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.514Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became follower at term 0"} Jan 30 13:56:26.515594 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.514Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8afdd45dfef98e56 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Jan 30 13:56:26.515594 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.514Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became follower at term 1"} Jan 30 13:56:26.515594 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.514Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942)"} Jan 30 13:56:26.515594 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.514Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942 12815731036974215786)"} Jan 30 13:56:26.515594 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.514Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942 12815731036974215786 15217703930295489506)"} Jan 30 13:56:26.518120 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:26.517Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jan 30 13:56:26.520136 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.519Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jan 30 13:56:26.520707 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.520Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jan 30 13:56:26.522026 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.521Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.522794 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.522Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.523873 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.523Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.524296 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.524Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.527766 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.524Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.527766 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.524Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.527766 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.525Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.527766 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.525Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a","remote-peer-urls":["http://172.31.22.227:2380"]} Jan 30 13:56:26.527766 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.525Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.527766 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.525Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.528587 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.527Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.531267 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.530Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.531369 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.530Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.532216 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.531Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.532329 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.531Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.532939 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.532Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.533054 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.532Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2","remote-peer-urls":["http://172.31.18.87:2380"]} Jan 30 13:56:26.534091 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.533Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8afdd45dfef98e56","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Jan 30 13:56:26.534328 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.532Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.537918 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.535Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Jan 30 13:56:26.537918 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.533Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.538336 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.536Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942 12815731036974215786 15217703930295489506)"} Jan 30 13:56:26.538336 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.536Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","added-peer-id":"8afdd45dfef98e56","added-peer-peer-urls":["http://172.31.21.135:2380"]} Jan 30 13:56:26.538336 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.536Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942 12815731036974215786 15217703930295489506)"} Jan 30 13:56:26.538336 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.536Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","added-peer-id":"b1da9f7a3bcbf26a","added-peer-peer-urls":["http://172.31.22.227:2380"]} Jan 30 13:56:26.538336 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.537Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942 12815731036974215786 15217703930295489506)"} Jan 30 13:56:26.538336 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.537Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","added-peer-id":"d3302519065413e2","added-peer-peer-urls":["http://172.31.18.87:2380"]} Jan 30 13:56:26.538336 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:26.537Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Jan 30 13:56:26.538336 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.538Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8afdd45dfef98e56","initial-advertise-peer-urls":["http://172.31.21.135:2380"],"listen-peer-urls":["http://172.31.21.135:2380"],"advertise-client-urls":["http://172.31.21.135:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Jan 30 13:56:26.538853 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.538Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"172.31.21.135:2380"} Jan 30 13:56:26.538853 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.538Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"172.31.21.135:2380"} Jan 30 13:56:26.540243 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.539Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"b1da9f7a3bcbf26a","stream-type":"stream Message"} Jan 30 13:56:26.540243 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.539Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.540243 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.539Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"b1da9f7a3bcbf26a","stream-type":"stream MsgApp v2"} Jan 30 13:56:26.540243 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.539Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:26.679633 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.679Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"d3302519065413e2","stream-type":"stream Message"} Jan 30 13:56:26.685912 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.680Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"d3302519065413e2"} Jan 30 13:56:26.685912 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.680Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.685912 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.680Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"d3302519065413e2","stream-type":"stream MsgApp v2"} Jan 30 13:56:26.685912 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.681Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.688735 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.687Z","caller":"etcdserver/server.go:767","msg":"initialized peer connections; fast-forwarding election ticks","local-member-id":"8afdd45dfef98e56","forward-ticks":8,"forward-duration":"800ms","election-ticks":10,"election-timeout":"1s","active-remote-members":2} Jan 30 13:56:26.688928 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.687Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:26.688928 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:26.687Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:27.162380 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.161Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for d3302519065413e2 [logterm: 1, index: 3] at term 1"} Jan 30 13:56:27.163652 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.163Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [term: 1] received a MsgVote message with higher term from d3302519065413e2 [term: 2]"} Jan 30 13:56:27.163652 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.163Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became follower at term 2"} Jan 30 13:56:27.163652 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.163Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 1, index: 3, vote: 0] cast MsgVote for d3302519065413e2 [logterm: 1, index: 3] at term 2"} Jan 30 13:56:27.166076 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.164Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8afdd45dfef98e56 elected leader d3302519065413e2 at term 2"} Jan 30 13:56:27.174789 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.173Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8afdd45dfef98e56","local-member-attributes":"{Name:ec2df8485e43c537d6435d556a7973a9 ClientURLs:[http://172.31.21.135:2379]}","request-path":"/0/members/8afdd45dfef98e56/attributes","cluster-id":"3d06b4668b670fe3","publish-timeout":"7s"} Jan 30 13:56:27.174789 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.173Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jan 30 13:56:27.174789 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.174Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jan 30 13:56:27.175708 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.175Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jan 30 13:56:27.175708 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.175Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jan 30 13:56:27.176931 systemd[1]: Started etcd-member.service - etcd (System Application Container). Jan 30 13:56:27.181051 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.178Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","cluster-version":"3.5"} Jan 30 13:56:27.183837 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:27.179Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Jan 30 13:56:27.194507 systemd[1]: Starting flanneld.service - flannel - Network fabric for containers (System Application Container)... Jan 30 13:56:27.363641 etcdctl[2385]: { "Network": "10.254.0.0/16", "Backend": {"Type": "udp"} } Jan 30 13:56:27.396962 flannel-wrapper[2395]: Error response from daemon: No such container: flannel Jan 30 13:56:27.413771 flannel-wrapper[2400]: Error response from daemon: No such container: flannel Jan 30 13:56:27.435412 flannel-wrapper[2414]: Unable to find image 'quay.io/coreos/flannel:v0.14.0' locally Jan 30 13:56:28.407079 flannel-wrapper[2414]: v0.14.0: Pulling from coreos/flannel Jan 30 13:56:28.637171 flannel-wrapper[2414]: 801bfaa63ef2: Pulling fs layer Jan 30 13:56:28.637171 flannel-wrapper[2414]: e4264a7179f6: Pulling fs layer Jan 30 13:56:28.637171 flannel-wrapper[2414]: bc75ea45ad2e: Pulling fs layer Jan 30 13:56:28.637171 flannel-wrapper[2414]: 78648579d12a: Pulling fs layer Jan 30 13:56:28.637171 flannel-wrapper[2414]: 3393447261e4: Pulling fs layer Jan 30 13:56:28.637171 flannel-wrapper[2414]: 071b96dd834b: Pulling fs layer Jan 30 13:56:28.637171 flannel-wrapper[2414]: 4de2f0468a91: Pulling fs layer Jan 30 13:56:28.637171 flannel-wrapper[2414]: 78648579d12a: Waiting Jan 30 13:56:28.637171 flannel-wrapper[2414]: 3393447261e4: Waiting Jan 30 13:56:28.637171 flannel-wrapper[2414]: 071b96dd834b: Waiting Jan 30 13:56:28.637171 flannel-wrapper[2414]: 4de2f0468a91: Waiting Jan 30 13:56:28.758093 systemd[1]: Started sshd@3-172.31.21.135:22-209.38.146.62:48526.service - OpenSSH per-connection server daemon (209.38.146.62:48526). Jan 30 13:56:28.927463 sshd[2421]: Connection closed by authenticating user root 209.38.146.62 port 48526 [preauth] Jan 30 13:56:28.930768 systemd[1]: sshd@3-172.31.21.135:22-209.38.146.62:48526.service: Deactivated successfully. Jan 30 13:56:28.962168 systemd[1]: Started sshd@4-172.31.21.135:22-209.38.146.62:48540.service - OpenSSH per-connection server daemon (209.38.146.62:48540). Jan 30 13:56:28.981917 flannel-wrapper[2414]: bc75ea45ad2e: Verifying Checksum Jan 30 13:56:28.982031 flannel-wrapper[2414]: bc75ea45ad2e: Download complete Jan 30 13:56:28.996015 flannel-wrapper[2414]: 801bfaa63ef2: Verifying Checksum Jan 30 13:56:29.129307 sshd[2426]: Connection closed by authenticating user root 209.38.146.62 port 48540 [preauth] Jan 30 13:56:29.133353 systemd[1]: sshd@4-172.31.21.135:22-209.38.146.62:48540.service: Deactivated successfully. Jan 30 13:56:29.174813 systemd[1]: Started sshd@5-172.31.21.135:22-209.38.146.62:48556.service - OpenSSH per-connection server daemon (209.38.146.62:48556). Jan 30 13:56:29.190872 flannel-wrapper[2414]: e4264a7179f6: Verifying Checksum Jan 30 13:56:29.190872 flannel-wrapper[2414]: e4264a7179f6: Download complete Jan 30 13:56:29.227983 flannel-wrapper[2414]: 801bfaa63ef2: Pull complete Jan 30 13:56:29.289252 flannel-wrapper[2414]: 3393447261e4: Verifying Checksum Jan 30 13:56:29.289252 flannel-wrapper[2414]: 3393447261e4: Download complete Jan 30 13:56:29.318222 sshd[2438]: Connection closed by authenticating user root 209.38.146.62 port 48556 [preauth] Jan 30 13:56:29.320227 systemd[1]: sshd@5-172.31.21.135:22-209.38.146.62:48556.service: Deactivated successfully. Jan 30 13:56:29.363217 systemd[1]: Started sshd@6-172.31.21.135:22-209.38.146.62:48570.service - OpenSSH per-connection server daemon (209.38.146.62:48570). Jan 30 13:56:29.460068 flannel-wrapper[2414]: 071b96dd834b: Verifying Checksum Jan 30 13:56:29.460068 flannel-wrapper[2414]: 071b96dd834b: Download complete Jan 30 13:56:29.483520 flannel-wrapper[2414]: 78648579d12a: Verifying Checksum Jan 30 13:56:29.483892 flannel-wrapper[2414]: 78648579d12a: Download complete Jan 30 13:56:29.508631 sshd[2448]: Connection closed by authenticating user root 209.38.146.62 port 48570 [preauth] Jan 30 13:56:29.510653 systemd[1]: sshd@6-172.31.21.135:22-209.38.146.62:48570.service: Deactivated successfully. Jan 30 13:56:29.547638 systemd[1]: Started sshd@7-172.31.21.135:22-209.38.146.62:48586.service - OpenSSH per-connection server daemon (209.38.146.62:48586). Jan 30 13:56:29.609906 flannel-wrapper[2414]: 4de2f0468a91: Verifying Checksum Jan 30 13:56:29.609906 flannel-wrapper[2414]: 4de2f0468a91: Download complete Jan 30 13:56:29.688126 sshd[2453]: Connection closed by authenticating user root 209.38.146.62 port 48586 [preauth] Jan 30 13:56:29.690607 systemd[1]: sshd@7-172.31.21.135:22-209.38.146.62:48586.service: Deactivated successfully. Jan 30 13:56:29.726204 systemd[1]: Started sshd@8-172.31.21.135:22-209.38.146.62:48596.service - OpenSSH per-connection server daemon (209.38.146.62:48596). Jan 30 13:56:29.755828 systemd[1]: var-lib-docker-overlay2-353f915ebeceaea6573422b29f6a3329e704a65fdb953f4a6d0b2c3c810e54fe-merged.mount: Deactivated successfully. Jan 30 13:56:29.846621 flannel-wrapper[2414]: e4264a7179f6: Pull complete Jan 30 13:56:29.874396 sshd[2458]: Connection closed by authenticating user root 209.38.146.62 port 48596 [preauth] Jan 30 13:56:29.876582 systemd[1]: sshd@8-172.31.21.135:22-209.38.146.62:48596.service: Deactivated successfully. Jan 30 13:56:29.915889 systemd[1]: Started sshd@9-172.31.21.135:22-209.38.146.62:48606.service - OpenSSH per-connection server daemon (209.38.146.62:48606). Jan 30 13:56:29.949447 systemd[1]: var-lib-docker-overlay2-29b9aa43eeb1c594220989e5bb0bf1ffb5dae537b71328fecc4d681ef62feae2-merged.mount: Deactivated successfully. Jan 30 13:56:29.984767 flannel-wrapper[2414]: bc75ea45ad2e: Pull complete Jan 30 13:56:30.062754 sshd[2468]: Connection closed by authenticating user root 209.38.146.62 port 48606 [preauth] Jan 30 13:56:30.066479 systemd[1]: sshd@9-172.31.21.135:22-209.38.146.62:48606.service: Deactivated successfully. Jan 30 13:56:30.100967 systemd[1]: Started sshd@10-172.31.21.135:22-209.38.146.62:48616.service - OpenSSH per-connection server daemon (209.38.146.62:48616). Jan 30 13:56:30.245320 sshd[2478]: Connection closed by authenticating user root 209.38.146.62 port 48616 [preauth] Jan 30 13:56:30.249298 systemd[1]: sshd@10-172.31.21.135:22-209.38.146.62:48616.service: Deactivated successfully. Jan 30 13:56:30.285240 systemd[1]: Started sshd@11-172.31.21.135:22-209.38.146.62:48618.service - OpenSSH per-connection server daemon (209.38.146.62:48618). Jan 30 13:56:30.420100 sshd[2483]: Connection closed by authenticating user root 209.38.146.62 port 48618 [preauth] Jan 30 13:56:30.423845 systemd[1]: sshd@11-172.31.21.135:22-209.38.146.62:48618.service: Deactivated successfully. Jan 30 13:56:30.459044 systemd[1]: Started sshd@12-172.31.21.135:22-209.38.146.62:48632.service - OpenSSH per-connection server daemon (209.38.146.62:48632). Jan 30 13:56:30.587936 systemd[1]: var-lib-docker-overlay2-cccb4d3def356e7a08d33d3386c7f2e56c639763ee336e833cbd1801aef88f51-merged.mount: Deactivated successfully. Jan 30 13:56:30.601846 sshd[2488]: Connection closed by authenticating user root 209.38.146.62 port 48632 [preauth] Jan 30 13:56:30.603816 systemd[1]: sshd@12-172.31.21.135:22-209.38.146.62:48632.service: Deactivated successfully. Jan 30 13:56:30.613141 systemd[1]: Started sshd@13-172.31.21.135:22-139.178.68.195:52762.service - OpenSSH per-connection server daemon (139.178.68.195:52762). Jan 30 13:56:30.633517 systemd[1]: Started sshd@14-172.31.21.135:22-209.38.146.62:48638.service - OpenSSH per-connection server daemon (209.38.146.62:48638). Jan 30 13:56:30.720149 flannel-wrapper[2414]: 78648579d12a: Pull complete Jan 30 13:56:30.739623 systemd[1]: var-lib-docker-overlay2-9bf82644819763f1c2925ce145f8bc60629be417b3223cb723a64c3abeff56b6-merged.mount: Deactivated successfully. Jan 30 13:56:30.756340 flannel-wrapper[2414]: 3393447261e4: Pull complete Jan 30 13:56:30.780995 systemd[1]: var-lib-docker-overlay2-6681b05d268b086721d5faa0a5865598bfc30beb37f67f5c4da435fe69acd537-merged.mount: Deactivated successfully. Jan 30 13:56:30.783948 sshd[2496]: Connection closed by authenticating user root 209.38.146.62 port 48638 [preauth] Jan 30 13:56:30.786824 systemd[1]: sshd@14-172.31.21.135:22-209.38.146.62:48638.service: Deactivated successfully. Jan 30 13:56:30.796344 sshd[2493]: Accepted publickey for core from 139.178.68.195 port 52762 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:30.798059 sshd[2493]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:30.798872 flannel-wrapper[2414]: 071b96dd834b: Pull complete Jan 30 13:56:30.806000 systemd-logind[1878]: New session 4 of user core. Jan 30 13:56:30.833287 systemd[1]: Started session-4.scope - Session 4 of User core. Jan 30 13:56:30.842404 systemd[1]: Started sshd@15-172.31.21.135:22-209.38.146.62:48640.service - OpenSSH per-connection server daemon (209.38.146.62:48640). Jan 30 13:56:30.868078 flannel-wrapper[2414]: 4de2f0468a91: Pull complete Jan 30 13:56:30.887892 flannel-wrapper[2414]: Digest: sha256:4a330b2f2e74046e493b2edc30d61fdebbdddaaedcb32d62736f25be8d3c64d5 Jan 30 13:56:30.899383 flannel-wrapper[2414]: Status: Downloaded newer image for quay.io/coreos/flannel:v0.14.0 Jan 30 13:56:30.982927 sshd[2493]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:30.987005 systemd[1]: sshd@13-172.31.21.135:22-139.178.68.195:52762.service: Deactivated successfully. Jan 30 13:56:30.990838 sshd[2513]: Connection closed by authenticating user root 209.38.146.62 port 48640 [preauth] Jan 30 13:56:30.991526 systemd[1]: sshd@15-172.31.21.135:22-209.38.146.62:48640.service: Deactivated successfully. Jan 30 13:56:30.994555 systemd[1]: session-4.scope: Deactivated successfully. Jan 30 13:56:30.995331 systemd-logind[1878]: Session 4 logged out. Waiting for processes to exit. Jan 30 13:56:30.997064 systemd-logind[1878]: Removed session 4. Jan 30 13:56:31.025119 systemd[1]: Started sshd@16-172.31.21.135:22-139.178.68.195:52764.service - OpenSSH per-connection server daemon (139.178.68.195:52764). Jan 30 13:56:31.038166 systemd[1]: Started sshd@17-172.31.21.135:22-209.38.146.62:48646.service - OpenSSH per-connection server daemon (209.38.146.62:48646). Jan 30 13:56:31.048399 containerd[1902]: time="2025-01-30T13:56:31.047972170Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jan 30 13:56:31.048399 containerd[1902]: time="2025-01-30T13:56:31.048045985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jan 30 13:56:31.048399 containerd[1902]: time="2025-01-30T13:56:31.048064585Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:31.048399 containerd[1902]: time="2025-01-30T13:56:31.048168724Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:31.077888 systemd[1]: Started docker-f783515da048d1e949eda0fb6ab5023ef13d960a7bc3b23f2ad6cf3d7d86da55.scope - libcontainer container f783515da048d1e949eda0fb6ab5023ef13d960a7bc3b23f2ad6cf3d7d86da55. Jan 30 13:56:31.131438 flannel-wrapper[2414]: I0130 13:56:31.130527 1 main.go:520] Determining IP address of default interface Jan 30 13:56:31.134765 flannel-wrapper[2414]: I0130 13:56:31.134202 1 main.go:533] Using interface with name eth0 and address 172.31.21.135 Jan 30 13:56:31.134765 flannel-wrapper[2414]: I0130 13:56:31.134283 1 main.go:550] Defaulting external address to interface address (172.31.21.135) Jan 30 13:56:31.134765 flannel-wrapper[2414]: I0130 13:56:31.134471 1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: None Jan 30 13:56:31.134765 flannel-wrapper[2414]: I0130 13:56:31.134513 1 main.go:257] Installing signal handlers Jan 30 13:56:31.140898 flannel-wrapper[2414]: I0130 13:56:31.140575 1 main.go:392] Found network config - Backend type: udp Jan 30 13:56:31.147242 flannel-wrapper[2414]: I0130 13:56:31.146731 1 local_manager.go:234] Picking subnet in range 10.254.1.0 ... 10.254.255.0 Jan 30 13:56:31.151512 flannel-wrapper[2414]: I0130 13:56:31.150016 1 local_manager.go:220] Allocated lease (10.254.13.0/24) to current node (172.31.21.135) Jan 30 13:56:31.158725 kernel: tun: Universal TUN/TAP device driver, 1.6 Jan 30 13:56:31.167956 (udev-worker)[2581]: Network interface NamePolicy= disabled on kernel command line. Jan 30 13:56:31.169172 systemd-networkd[1741]: flannel0: Link UP Jan 30 13:56:31.169181 systemd-networkd[1741]: flannel0: Gained carrier Jan 30 13:56:31.169482 systemd-networkd[1741]: flannel0: Gained IPv6LL Jan 30 13:56:31.171123 flannel-wrapper[2414]: I0130 13:56:31.166974 1 main.go:357] Current network or subnet (10.254.0.0/16, 10.254.13.0/24) is not equal to previous one (0.0.0.0/0, 0.0.0.0/0), trying to recycle old iptables rules Jan 30 13:56:31.199658 sshd[2532]: Connection closed by authenticating user root 209.38.146.62 port 48646 [preauth] Jan 30 13:56:31.201121 systemd[1]: sshd@17-172.31.21.135:22-209.38.146.62:48646.service: Deactivated successfully. Jan 30 13:56:31.209346 flannel-wrapper[2414]: I0130 13:56:31.209114 1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN Jan 30 13:56:31.210570 flannel-wrapper[2414]: I0130 13:56:31.210405 1 iptables.go:172] Deleting iptables rule: -s 0.0.0.0/0 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jan 30 13:56:31.211836 flannel-wrapper[2414]: I0130 13:56:31.211618 1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j RETURN Jan 30 13:56:31.213069 flannel-wrapper[2414]: I0130 13:56:31.212932 1 iptables.go:172] Deleting iptables rule: ! -s 0.0.0.0/0 -d 0.0.0.0/0 -j MASQUERADE --random-fully Jan 30 13:56:31.214924 flannel-wrapper[2414]: I0130 13:56:31.214786 1 main.go:307] Setting up masking rules Jan 30 13:56:31.217383 flannel-wrapper[2414]: I0130 13:56:31.217228 1 main.go:315] Changing default FORWARD chain policy to ACCEPT Jan 30 13:56:31.217961 flannel-wrapper[2414]: I0130 13:56:31.217617 1 main.go:323] Wrote subnet file to /run/flannel/subnet.env Jan 30 13:56:31.217961 flannel-wrapper[2414]: I0130 13:56:31.217633 1 main.go:327] Running backend. Jan 30 13:56:31.221120 flannel-wrapper[2414]: I0130 13:56:31.220504 1 udp_network_amd64.go:100] Watching for new subnet leases Jan 30 13:56:31.222727 flannel-wrapper[2414]: I0130 13:56:31.222537 1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules Jan 30 13:56:31.222727 flannel-wrapper[2414]: I0130 13:56:31.222555 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN Jan 30 13:56:31.225325 sshd[2526]: Accepted publickey for core from 139.178.68.195 port 52764 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:31.228964 flannel-wrapper[2414]: I0130 13:56:31.223844 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jan 30 13:56:31.228964 flannel-wrapper[2414]: I0130 13:56:31.225555 1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.13.0/24 -j RETURN Jan 30 13:56:31.228964 flannel-wrapper[2414]: I0130 13:56:31.227164 1 iptables.go:172] Deleting iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully Jan 30 13:56:31.228964 flannel-wrapper[2414]: I0130 13:56:31.228578 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -d 10.254.0.0/16 -j RETURN Jan 30 13:56:31.230003 sshd[2526]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:31.231222 systemd[1]: Started flanneld.service - flannel - Network fabric for containers (System Application Container). Jan 30 13:56:31.234858 flannel-wrapper[2414]: I0130 13:56:31.231151 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 ! -d 224.0.0.0/4 -j MASQUERADE --random-fully Jan 30 13:56:31.234858 flannel-wrapper[2414]: I0130 13:56:31.234176 1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.13.0/24 -j RETURN Jan 30 13:56:31.231770 systemd[1]: Reached target multi-user.target - Multi-User System. Jan 30 13:56:31.237093 systemd[1]: Starting flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jan 30 13:56:31.241068 systemd[1]: Started sshd@18-172.31.21.135:22-209.38.146.62:48658.service - OpenSSH per-connection server daemon (209.38.146.62:48658). Jan 30 13:56:31.241623 flannel-wrapper[2414]: I0130 13:56:31.239036 1 main.go:439] Waiting for 22h59m59.907949174s to renew lease Jan 30 13:56:31.253809 systemd-logind[1878]: New session 5 of user core. Jan 30 13:56:31.256057 flannel-wrapper[2414]: I0130 13:56:31.253746 1 iptables.go:148] Some iptables rules are missing; deleting and recreating rules Jan 30 13:56:31.256057 flannel-wrapper[2414]: I0130 13:56:31.253766 1 iptables.go:172] Deleting iptables rule: -s 10.254.0.0/16 -j ACCEPT Jan 30 13:56:31.258347 flannel-wrapper[2414]: I0130 13:56:31.257728 1 iptables.go:160] Adding iptables rule: ! -s 10.254.0.0/16 -d 10.254.0.0/16 -j MASQUERADE --random-fully Jan 30 13:56:31.260002 systemd[1]: Started session-5.scope - Session 5 of User core. Jan 30 13:56:31.267049 flannel-wrapper[2414]: I0130 13:56:31.266042 1 iptables.go:172] Deleting iptables rule: -d 10.254.0.0/16 -j ACCEPT Jan 30 13:56:31.272349 sh[2627]: + for try in 1 2 3 4 5 6 Jan 30 13:56:31.272349 sh[2627]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i Jan 30 13:56:31.274987 flannel-wrapper[2414]: I0130 13:56:31.274799 1 iptables.go:160] Adding iptables rule: -s 10.254.0.0/16 -j ACCEPT Jan 30 13:56:31.285057 flannel-wrapper[2414]: I0130 13:56:31.284798 1 iptables.go:160] Adding iptables rule: -d 10.254.0.0/16 -j ACCEPT Jan 30 13:56:31.302548 sh[2642]: Error response from daemon: No such container: flannel-docker-opts Jan 30 13:56:31.317740 sh[2651]: Error response from daemon: No such container: flannel-docker-opts Jan 30 13:56:31.373299 flannel-wrapper[2414]: I0130 13:56:31.372567 1 udp_network_amd64.go:196] Subnet added: 10.254.47.0/24 Jan 30 13:56:31.394854 sshd[2526]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:31.400075 sshd[2628]: Connection closed by authenticating user root 209.38.146.62 port 48658 [preauth] Jan 30 13:56:31.405387 systemd[1]: sshd@16-172.31.21.135:22-139.178.68.195:52764.service: Deactivated successfully. Jan 30 13:56:31.409566 systemd[1]: sshd@18-172.31.21.135:22-209.38.146.62:48658.service: Deactivated successfully. Jan 30 13:56:31.413327 systemd[1]: session-5.scope: Deactivated successfully. Jan 30 13:56:31.416522 systemd-logind[1878]: Session 5 logged out. Waiting for processes to exit. Jan 30 13:56:31.437421 systemd-logind[1878]: Removed session 5. Jan 30 13:56:31.442150 systemd[1]: Started sshd@19-172.31.21.135:22-209.38.146.62:48668.service - OpenSSH per-connection server daemon (209.38.146.62:48668). Jan 30 13:56:31.509871 containerd[1902]: time="2025-01-30T13:56:31.509723182Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jan 30 13:56:31.509871 containerd[1902]: time="2025-01-30T13:56:31.509810163Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jan 30 13:56:31.509871 containerd[1902]: time="2025-01-30T13:56:31.509824940Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:31.510276 containerd[1902]: time="2025-01-30T13:56:31.509917895Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:31.554542 systemd[1]: Started docker-508961026bc4f95ad21f8218997570c6a7e87af3c38f20c611e54dd2fb0ecdc3.scope - libcontainer container 508961026bc4f95ad21f8218997570c6a7e87af3c38f20c611e54dd2fb0ecdc3. Jan 30 13:56:31.603041 sshd[2673]: Connection closed by authenticating user root 209.38.146.62 port 48668 [preauth] Jan 30 13:56:31.603810 systemd[1]: sshd@19-172.31.21.135:22-209.38.146.62:48668.service: Deactivated successfully. Jan 30 13:56:31.648225 systemd[1]: Started sshd@20-172.31.21.135:22-209.38.146.62:48680.service - OpenSSH per-connection server daemon (209.38.146.62:48680). Jan 30 13:56:31.651032 systemd[1]: docker-508961026bc4f95ad21f8218997570c6a7e87af3c38f20c611e54dd2fb0ecdc3.scope: Deactivated successfully. Jan 30 13:56:31.682509 dockerd[2101]: time="2025-01-30T13:56:31.682451051Z" level=info msg="ignoring event" container=508961026bc4f95ad21f8218997570c6a7e87af3c38f20c611e54dd2fb0ecdc3 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jan 30 13:56:31.683159 containerd[1902]: time="2025-01-30T13:56:31.682893198Z" level=info msg="shim disconnected" id=508961026bc4f95ad21f8218997570c6a7e87af3c38f20c611e54dd2fb0ecdc3 namespace=moby Jan 30 13:56:31.683366 containerd[1902]: time="2025-01-30T13:56:31.683144664Z" level=warning msg="cleaning up after shim disconnected" id=508961026bc4f95ad21f8218997570c6a7e87af3c38f20c611e54dd2fb0ecdc3 namespace=moby Jan 30 13:56:31.683366 containerd[1902]: time="2025-01-30T13:56:31.683314080Z" level=info msg="cleaning up dead shim" namespace=moby Jan 30 13:56:31.742762 systemd[1]: var-lib-docker-overlay2-f16684abd680e01f75f00ab818f1cfc86b499103dff2844b7a9e8886d5d43552-merged.mount: Deactivated successfully. Jan 30 13:56:31.767044 dockerd[2101]: time="2025-01-30T13:56:31.766986781Z" level=info msg="Processing signal 'terminated'" Jan 30 13:56:31.767441 systemd[1]: Stopping docker.service - Docker Application Container Engine... Jan 30 13:56:31.780752 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.780Z","caller":"osutil/interrupt_unix.go:64","msg":"received signal; shutting down","signal":"terminated"} Jan 30 13:56:31.782657 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.780Z","caller":"embed/etcd.go:367","msg":"closing etcd server","name":"ec2df8485e43c537d6435d556a7973a9","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://172.31.21.135:2380"],"advertise-client-urls":["http://172.31.21.135:2379"]} Jan 30 13:56:31.783496 systemd-networkd[1741]: flannel0: Link DOWN Jan 30 13:56:31.783505 systemd-networkd[1741]: flannel0: Lost carrier Jan 30 13:56:31.784342 flannel-wrapper[2414]: I0130 13:56:31.782744 1 main.go:376] shutdownHandler sent cancel signal... Jan 30 13:56:31.784342 flannel-wrapper[2414]: I0130 13:56:31.783041 1 watch.go:174] context canceled, close receiver chan Jan 30 13:56:31.784342 flannel-wrapper[2414]: I0130 13:56:31.783058 1 main.go:432] Stopped monitoring lease Jan 30 13:56:31.784342 flannel-wrapper[2414]: I0130 13:56:31.783066 1 main.go:345] Waiting for all goroutines to exit Jan 30 13:56:31.784342 flannel-wrapper[2414]: I0130 13:56:31.783075 1 watch.go:40] context canceled, close receiver chan Jan 30 13:56:31.784342 flannel-wrapper[2414]: I0130 13:56:31.783083 1 udp_network_amd64.go:114] evts chan closed Jan 30 13:56:31.793100 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.789Z","caller":"etcdserver/server.go:1429","msg":"skipped leadership transfer; local server is not leader","local-member-id":"8afdd45dfef98e56","current-leader-member-id":"d3302519065413e2"} Jan 30 13:56:31.793100 etcd-wrapper[2283]: WARNING: 2025/01/30 13:56:31 [core] grpc: addrConn.createTransport failed to connect to {0.0.0.0:2379 0.0.0.0:2379 0 }. Err: connection error: desc = "transport: Error while dialing dial tcp 0.0.0.0:2379: connect: connection refused". Reconnecting... Jan 30 13:56:31.793100 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.789Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793100 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.790Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793100 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.790Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793100 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.790Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793100 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.790Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793100 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.790Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793100 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.790Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a","error":"context canceled"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.791Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"b1da9f7a3bcbf26a","error":"failed to read b1da9f7a3bcbf26a on stream MsgApp v2 (context canceled)"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.791Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.791Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a","error":"context canceled"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.791Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.791Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.791Z","caller":"rafthttp/peer.go:330","msg":"stopping remote peer","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.791Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.791Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.793936 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/stream.go:286","msg":"closed TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.795460 sshd[2728]: Connection closed by authenticating user root 209.38.146.62 port 48680 [preauth] Jan 30 13:56:31.795756 flannel-wrapper[2414]: I0130 13:56:31.794303 1 main.go:348] Exiting cleanly... Jan 30 13:56:31.795807 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/stream.go:294","msg":"stopped TCP streaming connection with remote peer","stream-writer-type":"stream Message","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.795807 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/pipeline.go:85","msg":"stopped HTTP pipelining with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.795807 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2","error":"context canceled"} Jan 30 13:56:31.795807 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"d3302519065413e2","error":"failed to read d3302519065413e2 on stream MsgApp v2 (context canceled)"} Jan 30 13:56:31.795807 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.795807 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2","error":"context canceled"} Jan 30 13:56:31.795807 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/stream.go:442","msg":"stopped stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.795807 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.792Z","caller":"rafthttp/peer.go:335","msg":"stopped remote peer","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:31.796208 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.793Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"8afdd45dfef98e56","remote-peer-id-stream-handler":"8afdd45dfef98e56","remote-peer-id-from":"b1da9f7a3bcbf26a","cluster-id":"3d06b4668b670fe3"} Jan 30 13:56:31.796208 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.793Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"8afdd45dfef98e56","remote-peer-id-stream-handler":"8afdd45dfef98e56","remote-peer-id-from":"b1da9f7a3bcbf26a","cluster-id":"3d06b4668b670fe3"} Jan 30 13:56:31.796208 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.794Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"8afdd45dfef98e56","remote-peer-id-stream-handler":"8afdd45dfef98e56","remote-peer-id-from":"d3302519065413e2","cluster-id":"3d06b4668b670fe3"} Jan 30 13:56:31.797193 systemd[1]: sshd@20-172.31.21.135:22-209.38.146.62:48680.service: Deactivated successfully. Jan 30 13:56:31.798233 etcd-wrapper[2283]: {"level":"warn","ts":"2025-01-30T13:56:31.795Z","caller":"rafthttp/http.go:413","msg":"failed to find remote peer in cluster","local-member-id":"8afdd45dfef98e56","remote-peer-id-stream-handler":"8afdd45dfef98e56","remote-peer-id-from":"d3302519065413e2","cluster-id":"3d06b4668b670fe3"} Jan 30 13:56:31.802812 systemd[1]: docker-f783515da048d1e949eda0fb6ab5023ef13d960a7bc3b23f2ad6cf3d7d86da55.scope: Deactivated successfully. Jan 30 13:56:31.806276 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:31.803Z","caller":"embed/etcd.go:562","msg":"stopping serving peer traffic","address":"172.31.21.135:2380"} Jan 30 13:56:31.829819 systemd[1]: Started sshd@21-172.31.21.135:22-209.38.146.62:48688.service - OpenSSH per-connection server daemon (209.38.146.62:48688). Jan 30 13:56:31.833676 dockerd[2101]: time="2025-01-30T13:56:31.833622526Z" level=info msg="ignoring event" container=f783515da048d1e949eda0fb6ab5023ef13d960a7bc3b23f2ad6cf3d7d86da55 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jan 30 13:56:31.834605 containerd[1902]: time="2025-01-30T13:56:31.834532479Z" level=info msg="shim disconnected" id=f783515da048d1e949eda0fb6ab5023ef13d960a7bc3b23f2ad6cf3d7d86da55 namespace=moby Jan 30 13:56:31.834605 containerd[1902]: time="2025-01-30T13:56:31.834596540Z" level=warning msg="cleaning up after shim disconnected" id=f783515da048d1e949eda0fb6ab5023ef13d960a7bc3b23f2ad6cf3d7d86da55 namespace=moby Jan 30 13:56:31.834800 containerd[1902]: time="2025-01-30T13:56:31.834611037Z" level=info msg="cleaning up dead shim" namespace=moby Jan 30 13:56:31.873646 systemd[1]: var-lib-docker-overlay2-bc9a689b63f39dc7402c2dd8bef320c54f64a9a9f7d6b61fe4405ef995d6a39d-merged.mount: Deactivated successfully. Jan 30 13:56:31.966881 sshd[2779]: Connection closed by authenticating user root 209.38.146.62 port 48688 [preauth] Jan 30 13:56:31.971794 systemd[1]: sshd@21-172.31.21.135:22-209.38.146.62:48688.service: Deactivated successfully. Jan 30 13:56:32.007236 systemd[1]: Started sshd@22-172.31.21.135:22-209.38.146.62:48698.service - OpenSSH per-connection server daemon (209.38.146.62:48698). Jan 30 13:56:32.149462 sshd[2804]: Connection closed by authenticating user root 209.38.146.62 port 48698 [preauth] Jan 30 13:56:32.153166 systemd[1]: sshd@22-172.31.21.135:22-209.38.146.62:48698.service: Deactivated successfully. Jan 30 13:56:32.207444 systemd[1]: Started sshd@23-172.31.21.135:22-209.38.146.62:48714.service - OpenSSH per-connection server daemon (209.38.146.62:48714). Jan 30 13:56:32.327898 sshd[2809]: Connection closed by authenticating user root 209.38.146.62 port 48714 [preauth] Jan 30 13:56:32.331300 systemd[1]: sshd@23-172.31.21.135:22-209.38.146.62:48714.service: Deactivated successfully. Jan 30 13:56:32.386543 systemd[1]: Started sshd@24-172.31.21.135:22-209.38.146.62:48724.service - OpenSSH per-connection server daemon (209.38.146.62:48724). Jan 30 13:56:32.521953 sshd[2814]: Connection closed by authenticating user root 209.38.146.62 port 48724 [preauth] Jan 30 13:56:32.524632 systemd[1]: sshd@24-172.31.21.135:22-209.38.146.62:48724.service: Deactivated successfully. Jan 30 13:56:32.562200 systemd[1]: Started sshd@25-172.31.21.135:22-209.38.146.62:48730.service - OpenSSH per-connection server daemon (209.38.146.62:48730). Jan 30 13:56:32.681507 sshd[2819]: Connection closed by authenticating user root 209.38.146.62 port 48730 [preauth] Jan 30 13:56:32.687279 systemd[1]: sshd@25-172.31.21.135:22-209.38.146.62:48730.service: Deactivated successfully. Jan 30 13:56:32.719549 systemd[1]: Started sshd@26-172.31.21.135:22-209.38.146.62:48742.service - OpenSSH per-connection server daemon (209.38.146.62:48742). Jan 30 13:56:32.804518 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:32.804Z","caller":"embed/etcd.go:567","msg":"stopped serving peer traffic","address":"172.31.21.135:2380"} Jan 30 13:56:32.804518 etcd-wrapper[2283]: {"level":"info","ts":"2025-01-30T13:56:32.804Z","caller":"embed/etcd.go:369","msg":"closed etcd server","name":"ec2df8485e43c537d6435d556a7973a9","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://172.31.21.135:2380"],"advertise-client-urls":["http://172.31.21.135:2379"]} Jan 30 13:56:32.808448 systemd[1]: docker-16b057d0304fe8b66625c328a086cc76a6ca966689fd0a72b365a1b638cb7016.scope: Deactivated successfully. Jan 30 13:56:32.831429 dockerd[2101]: time="2025-01-30T13:56:32.831367443Z" level=info msg="ignoring event" container=16b057d0304fe8b66625c328a086cc76a6ca966689fd0a72b365a1b638cb7016 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jan 30 13:56:32.832060 containerd[1902]: time="2025-01-30T13:56:32.831811042Z" level=info msg="shim disconnected" id=16b057d0304fe8b66625c328a086cc76a6ca966689fd0a72b365a1b638cb7016 namespace=moby Jan 30 13:56:32.832060 containerd[1902]: time="2025-01-30T13:56:32.831871864Z" level=warning msg="cleaning up after shim disconnected" id=16b057d0304fe8b66625c328a086cc76a6ca966689fd0a72b365a1b638cb7016 namespace=moby Jan 30 13:56:32.832060 containerd[1902]: time="2025-01-30T13:56:32.831884893Z" level=info msg="cleaning up dead shim" namespace=moby Jan 30 13:56:32.849709 sshd[2824]: Connection closed by authenticating user root 209.38.146.62 port 48742 [preauth] Jan 30 13:56:32.862037 systemd[1]: sshd@26-172.31.21.135:22-209.38.146.62:48742.service: Deactivated successfully. Jan 30 13:56:32.895570 systemd[1]: Started sshd@27-172.31.21.135:22-209.38.146.62:48746.service - OpenSSH per-connection server daemon (209.38.146.62:48746). Jan 30 13:56:32.909914 systemd[1]: var-lib-docker-overlay2-31c52c69afc858d47934ac3bf98e1193c60f695e6c16b9ab041d33ddca28f0ae-merged.mount: Deactivated successfully. Jan 30 13:56:32.946170 dockerd[2101]: time="2025-01-30T13:56:32.946122423Z" level=info msg="stopping event stream following graceful shutdown" error="" module=libcontainerd namespace=moby Jan 30 13:56:32.946806 dockerd[2101]: time="2025-01-30T13:56:32.946769958Z" level=info msg="Daemon shutdown complete" Jan 30 13:56:33.032063 sshd[2848]: Connection closed by authenticating user root 209.38.146.62 port 48746 [preauth] Jan 30 13:56:33.037369 systemd[1]: sshd@27-172.31.21.135:22-209.38.146.62:48746.service: Deactivated successfully. Jan 30 13:56:33.080371 systemd[1]: Started sshd@28-172.31.21.135:22-209.38.146.62:48756.service - OpenSSH per-connection server daemon (209.38.146.62:48756). Jan 30 13:56:33.202754 sshd[2861]: Connection closed by authenticating user root 209.38.146.62 port 48756 [preauth] Jan 30 13:56:33.206111 systemd[1]: sshd@28-172.31.21.135:22-209.38.146.62:48756.service: Deactivated successfully. Jan 30 13:56:33.248390 systemd[1]: Started sshd@29-172.31.21.135:22-209.38.146.62:48766.service - OpenSSH per-connection server daemon (209.38.146.62:48766). Jan 30 13:56:33.370945 sshd[2866]: Connection closed by authenticating user root 209.38.146.62 port 48766 [preauth] Jan 30 13:56:33.374388 systemd[1]: sshd@29-172.31.21.135:22-209.38.146.62:48766.service: Deactivated successfully. Jan 30 13:56:33.409376 systemd[1]: docker.service: Deactivated successfully. Jan 30 13:56:33.409992 systemd[1]: Stopped docker.service - Docker Application Container Engine. Jan 30 13:56:33.410082 systemd[1]: docker.service: Consumed 5.098s CPU time. Jan 30 13:56:33.412601 systemd[1]: docker.socket: Deactivated successfully. Jan 30 13:56:33.415854 systemd[1]: Closed docker.socket - Docker Socket for the API. Jan 30 13:56:33.415916 systemd[1]: Stopping docker.socket - Docker Socket for the API... Jan 30 13:56:33.417440 docker[2852]: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running? Jan 30 13:56:33.418052 docker[2794]: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running? Jan 30 13:56:33.420936 systemd[1]: Starting docker.socket - Docker Socket for the API... Jan 30 13:56:33.434828 systemd[1]: Started sshd@30-172.31.21.135:22-209.38.146.62:48782.service - OpenSSH per-connection server daemon (209.38.146.62:48782). Jan 30 13:56:33.435884 systemd[1]: flanneld.service: Control process exited, code=exited, status=1/FAILURE Jan 30 13:56:33.441006 systemd[1]: etcd-member.service: Control process exited, code=exited, status=1/FAILURE Jan 30 13:56:33.445909 systemd[1]: Listening on docker.socket - Docker Socket for the API. Jan 30 13:56:33.461505 systemd[1]: Starting docker.service - Docker Application Container Engine... Jan 30 13:56:33.491288 (dockerd)[2878]: docker.service: Referenced but unset environment variable evaluates to an empty string: DOCKER_CGROUPS, DOCKER_OPTS Jan 30 13:56:33.595142 dockerd[2878]: time="2025-01-30T13:56:33.595028641Z" level=info msg="Starting up" Jan 30 13:56:33.616356 sshd[2873]: Connection closed by authenticating user root 209.38.146.62 port 48782 [preauth] Jan 30 13:56:33.618308 systemd[1]: sshd@30-172.31.21.135:22-209.38.146.62:48782.service: Deactivated successfully. Jan 30 13:56:33.660654 systemd[1]: Started sshd@31-172.31.21.135:22-209.38.146.62:48790.service - OpenSSH per-connection server daemon (209.38.146.62:48790). Jan 30 13:56:33.694909 dockerd[2878]: time="2025-01-30T13:56:33.694851999Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Jan 30 13:56:33.714261 dockerd[2878]: time="2025-01-30T13:56:33.714163641Z" level=info msg="Loading containers: start." Jan 30 13:56:33.784969 sshd[2910]: Connection closed by authenticating user root 209.38.146.62 port 48790 [preauth] Jan 30 13:56:33.789411 systemd[1]: sshd@31-172.31.21.135:22-209.38.146.62:48790.service: Deactivated successfully. Jan 30 13:56:33.823556 systemd[1]: Started sshd@32-172.31.21.135:22-209.38.146.62:48800.service - OpenSSH per-connection server daemon (209.38.146.62:48800). Jan 30 13:56:33.947082 sshd[2930]: Connection closed by authenticating user root 209.38.146.62 port 48800 [preauth] Jan 30 13:56:33.952115 systemd[1]: sshd@32-172.31.21.135:22-209.38.146.62:48800.service: Deactivated successfully. Jan 30 13:56:33.981225 systemd[1]: Started sshd@33-172.31.21.135:22-209.38.146.62:48808.service - OpenSSH per-connection server daemon (209.38.146.62:48808). Jan 30 13:56:34.058009 dockerd[2878]: time="2025-01-30T13:56:34.057677366Z" level=info msg="Loading containers: done." Jan 30 13:56:34.081161 dockerd[2878]: time="2025-01-30T13:56:34.081104010Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jan 30 13:56:34.081463 dockerd[2878]: time="2025-01-30T13:56:34.081233053Z" level=info msg="Docker daemon" commit=061aa95809be396a6b5542618d8a34b02a21ff77 containerd-snapshotter=false storage-driver=overlay2 version=26.1.0 Jan 30 13:56:34.081463 dockerd[2878]: time="2025-01-30T13:56:34.081290209Z" level=info msg="Daemon has completed initialization" Jan 30 13:56:34.105978 dockerd[2878]: time="2025-01-30T13:56:34.105912933Z" level=info msg="API listen on /run/docker.sock" Jan 30 13:56:34.106276 systemd[1]: Started docker.service - Docker Application Container Engine. Jan 30 13:56:34.108509 sh[2637]: Restarted Docker to apply Flannel options Jan 30 13:56:34.110409 sh[2627]: + break Jan 30 13:56:34.110409 sh[2627]: + '[' 1 '!=' fail ']' Jan 30 13:56:34.112115 sshd[2991]: Connection closed by authenticating user root 209.38.146.62 port 48808 [preauth] Jan 30 13:56:34.110163 systemd[1]: Finished flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jan 30 13:56:34.110953 systemd[1]: Startup finished in 1.016s (kernel) + 7.072s (initrd) + 22.388s (userspace) = 30.477s. Jan 30 13:56:34.113542 systemd[1]: sshd@33-172.31.21.135:22-209.38.146.62:48808.service: Deactivated successfully. Jan 30 13:56:34.121665 docker[2874]: flannel Jan 30 13:56:34.125233 systemd[1]: flanneld.service: Failed with result 'exit-code'. Jan 30 13:56:34.126107 docker[2875]: etcd-member Jan 30 13:56:34.127645 systemd[1]: etcd-member.service: Failed with result 'exit-code'. Jan 30 13:56:34.153300 systemd[1]: Started sshd@34-172.31.21.135:22-209.38.146.62:48810.service - OpenSSH per-connection server daemon (209.38.146.62:48810). Jan 30 13:56:34.298874 sshd[3050]: Connection closed by authenticating user root 209.38.146.62 port 48810 [preauth] Jan 30 13:56:34.302602 systemd[1]: sshd@34-172.31.21.135:22-209.38.146.62:48810.service: Deactivated successfully. Jan 30 13:56:34.338074 systemd[1]: Started sshd@35-172.31.21.135:22-209.38.146.62:48816.service - OpenSSH per-connection server daemon (209.38.146.62:48816). Jan 30 13:56:34.458480 sshd[3055]: Connection closed by authenticating user root 209.38.146.62 port 48816 [preauth] Jan 30 13:56:34.463748 systemd[1]: sshd@35-172.31.21.135:22-209.38.146.62:48816.service: Deactivated successfully. Jan 30 13:56:34.495166 systemd[1]: Started sshd@36-172.31.21.135:22-209.38.146.62:48818.service - OpenSSH per-connection server daemon (209.38.146.62:48818). Jan 30 13:56:34.628514 sshd[3060]: Connection closed by authenticating user root 209.38.146.62 port 48818 [preauth] Jan 30 13:56:34.631125 systemd[1]: sshd@36-172.31.21.135:22-209.38.146.62:48818.service: Deactivated successfully. Jan 30 13:56:34.664326 systemd[1]: Started sshd@37-172.31.21.135:22-209.38.146.62:48830.service - OpenSSH per-connection server daemon (209.38.146.62:48830). Jan 30 13:56:34.798180 sshd[3065]: Connection closed by authenticating user root 209.38.146.62 port 48830 [preauth] Jan 30 13:56:34.801151 systemd[1]: sshd@37-172.31.21.135:22-209.38.146.62:48830.service: Deactivated successfully. Jan 30 13:56:34.832198 systemd[1]: Started sshd@38-172.31.21.135:22-209.38.146.62:48840.service - OpenSSH per-connection server daemon (209.38.146.62:48840). Jan 30 13:56:34.956988 sshd[3070]: Connection closed by authenticating user root 209.38.146.62 port 48840 [preauth] Jan 30 13:56:34.959312 systemd[1]: sshd@38-172.31.21.135:22-209.38.146.62:48840.service: Deactivated successfully. Jan 30 13:56:35.005128 systemd[1]: Started sshd@39-172.31.21.135:22-209.38.146.62:48854.service - OpenSSH per-connection server daemon (209.38.146.62:48854). Jan 30 13:56:35.135996 sshd[3075]: Connection closed by authenticating user root 209.38.146.62 port 48854 [preauth] Jan 30 13:56:35.138361 systemd[1]: sshd@39-172.31.21.135:22-209.38.146.62:48854.service: Deactivated successfully. Jan 30 13:56:35.175066 systemd[1]: Started sshd@40-172.31.21.135:22-209.38.146.62:48862.service - OpenSSH per-connection server daemon (209.38.146.62:48862). Jan 30 13:56:35.298435 sshd[3080]: Connection closed by authenticating user root 209.38.146.62 port 48862 [preauth] Jan 30 13:56:35.301036 systemd[1]: sshd@40-172.31.21.135:22-209.38.146.62:48862.service: Deactivated successfully. Jan 30 13:56:35.334096 systemd[1]: Started sshd@41-172.31.21.135:22-209.38.146.62:48878.service - OpenSSH per-connection server daemon (209.38.146.62:48878). Jan 30 13:56:35.468493 sshd[3085]: Connection closed by authenticating user root 209.38.146.62 port 48878 [preauth] Jan 30 13:56:35.471097 systemd[1]: sshd@41-172.31.21.135:22-209.38.146.62:48878.service: Deactivated successfully. Jan 30 13:56:35.507262 systemd[1]: Started sshd@42-172.31.21.135:22-209.38.146.62:48894.service - OpenSSH per-connection server daemon (209.38.146.62:48894). Jan 30 13:56:35.631148 sshd[3090]: Connection closed by authenticating user root 209.38.146.62 port 48894 [preauth] Jan 30 13:56:35.633839 systemd[1]: sshd@42-172.31.21.135:22-209.38.146.62:48894.service: Deactivated successfully. Jan 30 13:56:35.668856 systemd[1]: Started sshd@43-172.31.21.135:22-209.38.146.62:48900.service - OpenSSH per-connection server daemon (209.38.146.62:48900). Jan 30 13:56:35.790325 sshd[3095]: Connection closed by authenticating user root 209.38.146.62 port 48900 [preauth] Jan 30 13:56:35.793192 systemd[1]: sshd@43-172.31.21.135:22-209.38.146.62:48900.service: Deactivated successfully. Jan 30 13:56:35.826066 systemd[1]: Started sshd@44-172.31.21.135:22-209.38.146.62:48904.service - OpenSSH per-connection server daemon (209.38.146.62:48904). Jan 30 13:56:35.969033 sshd[3100]: Connection closed by authenticating user root 209.38.146.62 port 48904 [preauth] Jan 30 13:56:35.971841 systemd[1]: sshd@44-172.31.21.135:22-209.38.146.62:48904.service: Deactivated successfully. Jan 30 13:56:36.010597 systemd[1]: Started sshd@45-172.31.21.135:22-209.38.146.62:48908.service - OpenSSH per-connection server daemon (209.38.146.62:48908). Jan 30 13:56:36.142562 sshd[3105]: Connection closed by authenticating user root 209.38.146.62 port 48908 [preauth] Jan 30 13:56:36.145647 systemd[1]: sshd@45-172.31.21.135:22-209.38.146.62:48908.service: Deactivated successfully. Jan 30 13:56:36.176494 systemd[1]: Started sshd@46-172.31.21.135:22-209.38.146.62:48918.service - OpenSSH per-connection server daemon (209.38.146.62:48918). Jan 30 13:56:36.348491 sshd[3110]: Connection closed by authenticating user root 209.38.146.62 port 48918 [preauth] Jan 30 13:56:36.351223 systemd[1]: sshd@46-172.31.21.135:22-209.38.146.62:48918.service: Deactivated successfully. Jan 30 13:56:36.397102 systemd[1]: Started sshd@47-172.31.21.135:22-209.38.146.62:48920.service - OpenSSH per-connection server daemon (209.38.146.62:48920). Jan 30 13:56:36.529834 sshd[3115]: Connection closed by authenticating user root 209.38.146.62 port 48920 [preauth] Jan 30 13:56:36.532171 systemd[1]: sshd@47-172.31.21.135:22-209.38.146.62:48920.service: Deactivated successfully. Jan 30 13:56:36.567617 systemd[1]: Started sshd@48-172.31.21.135:22-209.38.146.62:48928.service - OpenSSH per-connection server daemon (209.38.146.62:48928). Jan 30 13:56:36.705855 sshd[3120]: Connection closed by authenticating user root 209.38.146.62 port 48928 [preauth] Jan 30 13:56:36.708111 systemd[1]: sshd@48-172.31.21.135:22-209.38.146.62:48928.service: Deactivated successfully. Jan 30 13:56:36.735865 systemd[1]: Started sshd@49-172.31.21.135:22-209.38.146.62:48938.service - OpenSSH per-connection server daemon (209.38.146.62:48938). Jan 30 13:56:36.861267 sshd[3125]: Connection closed by authenticating user root 209.38.146.62 port 48938 [preauth] Jan 30 13:56:36.864194 systemd[1]: sshd@49-172.31.21.135:22-209.38.146.62:48938.service: Deactivated successfully. Jan 30 13:56:36.893512 systemd[1]: Started sshd@50-172.31.21.135:22-209.38.146.62:48952.service - OpenSSH per-connection server daemon (209.38.146.62:48952). Jan 30 13:56:37.028571 sshd[3130]: Connection closed by authenticating user root 209.38.146.62 port 48952 [preauth] Jan 30 13:56:37.033599 systemd[1]: sshd@50-172.31.21.135:22-209.38.146.62:48952.service: Deactivated successfully. Jan 30 13:56:37.084113 systemd[1]: Started sshd@51-172.31.21.135:22-209.38.146.62:48968.service - OpenSSH per-connection server daemon (209.38.146.62:48968). Jan 30 13:56:37.219342 sshd[3135]: Connection closed by authenticating user root 209.38.146.62 port 48968 [preauth] Jan 30 13:56:37.221805 systemd[1]: sshd@51-172.31.21.135:22-209.38.146.62:48968.service: Deactivated successfully. Jan 30 13:56:37.261122 systemd[1]: Started sshd@52-172.31.21.135:22-209.38.146.62:44500.service - OpenSSH per-connection server daemon (209.38.146.62:44500). Jan 30 13:56:37.397981 sshd[3140]: Connection closed by authenticating user root 209.38.146.62 port 44500 [preauth] Jan 30 13:56:37.400466 systemd[1]: sshd@52-172.31.21.135:22-209.38.146.62:44500.service: Deactivated successfully. Jan 30 13:56:37.437137 systemd[1]: Started sshd@53-172.31.21.135:22-209.38.146.62:44510.service - OpenSSH per-connection server daemon (209.38.146.62:44510). Jan 30 13:56:37.573280 sshd[3145]: Connection closed by authenticating user root 209.38.146.62 port 44510 [preauth] Jan 30 13:56:37.576804 systemd[1]: sshd@53-172.31.21.135:22-209.38.146.62:44510.service: Deactivated successfully. Jan 30 13:56:37.614318 systemd[1]: Started sshd@54-172.31.21.135:22-209.38.146.62:44526.service - OpenSSH per-connection server daemon (209.38.146.62:44526). Jan 30 13:56:37.748099 sshd[3150]: Connection closed by authenticating user root 209.38.146.62 port 44526 [preauth] Jan 30 13:56:37.750542 systemd[1]: sshd@54-172.31.21.135:22-209.38.146.62:44526.service: Deactivated successfully. Jan 30 13:56:37.786344 systemd[1]: Started sshd@55-172.31.21.135:22-209.38.146.62:44528.service - OpenSSH per-connection server daemon (209.38.146.62:44528). Jan 30 13:56:37.917030 sshd[3155]: Connection closed by authenticating user root 209.38.146.62 port 44528 [preauth] Jan 30 13:56:37.919479 systemd[1]: sshd@55-172.31.21.135:22-209.38.146.62:44528.service: Deactivated successfully. Jan 30 13:56:37.965250 systemd[1]: Started sshd@56-172.31.21.135:22-209.38.146.62:44534.service - OpenSSH per-connection server daemon (209.38.146.62:44534). Jan 30 13:56:38.142975 sshd[3160]: Connection closed by authenticating user root 209.38.146.62 port 44534 [preauth] Jan 30 13:56:38.145642 systemd[1]: sshd@56-172.31.21.135:22-209.38.146.62:44534.service: Deactivated successfully. Jan 30 13:56:38.181615 systemd[1]: Started sshd@57-172.31.21.135:22-209.38.146.62:44544.service - OpenSSH per-connection server daemon (209.38.146.62:44544). Jan 30 13:56:38.307849 sshd[3165]: Connection closed by authenticating user root 209.38.146.62 port 44544 [preauth] Jan 30 13:56:38.310760 systemd[1]: sshd@57-172.31.21.135:22-209.38.146.62:44544.service: Deactivated successfully. Jan 30 13:56:38.341408 systemd[1]: Started sshd@58-172.31.21.135:22-209.38.146.62:44558.service - OpenSSH per-connection server daemon (209.38.146.62:44558). Jan 30 13:56:38.470205 sshd[3170]: Connection closed by authenticating user root 209.38.146.62 port 44558 [preauth] Jan 30 13:56:38.472753 systemd[1]: sshd@58-172.31.21.135:22-209.38.146.62:44558.service: Deactivated successfully. Jan 30 13:56:38.510238 systemd[1]: Started sshd@59-172.31.21.135:22-209.38.146.62:44560.service - OpenSSH per-connection server daemon (209.38.146.62:44560). Jan 30 13:56:38.636428 sshd[3175]: Connection closed by authenticating user root 209.38.146.62 port 44560 [preauth] Jan 30 13:56:38.639359 systemd[1]: sshd@59-172.31.21.135:22-209.38.146.62:44560.service: Deactivated successfully. Jan 30 13:56:38.674277 systemd[1]: Started sshd@60-172.31.21.135:22-209.38.146.62:44562.service - OpenSSH per-connection server daemon (209.38.146.62:44562). Jan 30 13:56:38.800324 sshd[3180]: Connection closed by authenticating user root 209.38.146.62 port 44562 [preauth] Jan 30 13:56:38.803525 systemd[1]: sshd@60-172.31.21.135:22-209.38.146.62:44562.service: Deactivated successfully. Jan 30 13:56:38.837138 systemd[1]: Started sshd@61-172.31.21.135:22-209.38.146.62:44572.service - OpenSSH per-connection server daemon (209.38.146.62:44572). Jan 30 13:56:38.966204 sshd[3185]: Connection closed by authenticating user root 209.38.146.62 port 44572 [preauth] Jan 30 13:56:38.968906 systemd[1]: sshd@61-172.31.21.135:22-209.38.146.62:44572.service: Deactivated successfully. Jan 30 13:56:39.002402 systemd[1]: Started sshd@62-172.31.21.135:22-209.38.146.62:44584.service - OpenSSH per-connection server daemon (209.38.146.62:44584). Jan 30 13:56:39.124982 sshd[3190]: Connection closed by authenticating user root 209.38.146.62 port 44584 [preauth] Jan 30 13:56:39.126723 systemd[1]: sshd@62-172.31.21.135:22-209.38.146.62:44584.service: Deactivated successfully. Jan 30 13:56:39.162180 systemd[1]: Started sshd@63-172.31.21.135:22-209.38.146.62:44588.service - OpenSSH per-connection server daemon (209.38.146.62:44588). Jan 30 13:56:39.285943 sshd[3195]: Connection closed by authenticating user root 209.38.146.62 port 44588 [preauth] Jan 30 13:56:39.288636 systemd[1]: sshd@63-172.31.21.135:22-209.38.146.62:44588.service: Deactivated successfully. Jan 30 13:56:39.325115 systemd[1]: Started sshd@64-172.31.21.135:22-209.38.146.62:44596.service - OpenSSH per-connection server daemon (209.38.146.62:44596). Jan 30 13:56:39.445456 sshd[3200]: Connection closed by authenticating user root 209.38.146.62 port 44596 [preauth] Jan 30 13:56:39.448241 systemd[1]: sshd@64-172.31.21.135:22-209.38.146.62:44596.service: Deactivated successfully. Jan 30 13:56:39.481582 systemd[1]: Started sshd@65-172.31.21.135:22-209.38.146.62:44602.service - OpenSSH per-connection server daemon (209.38.146.62:44602). Jan 30 13:56:39.607613 sshd[3205]: Connection closed by authenticating user root 209.38.146.62 port 44602 [preauth] Jan 30 13:56:39.612953 systemd[1]: sshd@65-172.31.21.135:22-209.38.146.62:44602.service: Deactivated successfully. Jan 30 13:56:39.668335 systemd[1]: Started sshd@66-172.31.21.135:22-209.38.146.62:44604.service - OpenSSH per-connection server daemon (209.38.146.62:44604). Jan 30 13:56:39.806104 sshd[3210]: Connection closed by authenticating user root 209.38.146.62 port 44604 [preauth] Jan 30 13:56:39.809949 systemd[1]: sshd@66-172.31.21.135:22-209.38.146.62:44604.service: Deactivated successfully. Jan 30 13:56:39.845152 systemd[1]: Started sshd@67-172.31.21.135:22-209.38.146.62:44606.service - OpenSSH per-connection server daemon (209.38.146.62:44606). Jan 30 13:56:39.984732 sshd[3215]: Connection closed by authenticating user root 209.38.146.62 port 44606 [preauth] Jan 30 13:56:39.989101 systemd[1]: sshd@67-172.31.21.135:22-209.38.146.62:44606.service: Deactivated successfully. Jan 30 13:56:40.033663 systemd[1]: Started sshd@68-172.31.21.135:22-209.38.146.62:44616.service - OpenSSH per-connection server daemon (209.38.146.62:44616). Jan 30 13:56:40.150181 sshd[3220]: Connection closed by authenticating user root 209.38.146.62 port 44616 [preauth] Jan 30 13:56:40.153580 systemd[1]: sshd@68-172.31.21.135:22-209.38.146.62:44616.service: Deactivated successfully. Jan 30 13:56:40.193243 systemd[1]: Started sshd@69-172.31.21.135:22-209.38.146.62:44624.service - OpenSSH per-connection server daemon (209.38.146.62:44624). Jan 30 13:56:40.315178 sshd[3225]: Connection closed by authenticating user root 209.38.146.62 port 44624 [preauth] Jan 30 13:56:40.317644 systemd[1]: sshd@69-172.31.21.135:22-209.38.146.62:44624.service: Deactivated successfully. Jan 30 13:56:40.367111 systemd[1]: Started sshd@70-172.31.21.135:22-209.38.146.62:44634.service - OpenSSH per-connection server daemon (209.38.146.62:44634). Jan 30 13:56:40.488122 sshd[3230]: Connection closed by authenticating user root 209.38.146.62 port 44634 [preauth] Jan 30 13:56:40.490954 systemd[1]: sshd@70-172.31.21.135:22-209.38.146.62:44634.service: Deactivated successfully. Jan 30 13:56:40.526654 systemd[1]: Started sshd@71-172.31.21.135:22-209.38.146.62:44650.service - OpenSSH per-connection server daemon (209.38.146.62:44650). Jan 30 13:56:40.660294 sshd[3235]: Connection closed by authenticating user root 209.38.146.62 port 44650 [preauth] Jan 30 13:56:40.663767 systemd[1]: sshd@71-172.31.21.135:22-209.38.146.62:44650.service: Deactivated successfully. Jan 30 13:56:40.708126 systemd[1]: Started sshd@72-172.31.21.135:22-209.38.146.62:44652.service - OpenSSH per-connection server daemon (209.38.146.62:44652). Jan 30 13:56:40.831071 sshd[3240]: Connection closed by authenticating user root 209.38.146.62 port 44652 [preauth] Jan 30 13:56:40.833936 systemd[1]: sshd@72-172.31.21.135:22-209.38.146.62:44652.service: Deactivated successfully. Jan 30 13:56:40.880268 systemd[1]: Started sshd@73-172.31.21.135:22-209.38.146.62:44654.service - OpenSSH per-connection server daemon (209.38.146.62:44654). Jan 30 13:56:41.006574 sshd[3245]: Connection closed by authenticating user root 209.38.146.62 port 44654 [preauth] Jan 30 13:56:41.010777 systemd[1]: sshd@73-172.31.21.135:22-209.38.146.62:44654.service: Deactivated successfully. Jan 30 13:56:41.045322 systemd[1]: Started sshd@74-172.31.21.135:22-209.38.146.62:44662.service - OpenSSH per-connection server daemon (209.38.146.62:44662). Jan 30 13:56:41.195743 sshd[3250]: Connection closed by authenticating user root 209.38.146.62 port 44662 [preauth] Jan 30 13:56:41.198432 systemd[1]: sshd@74-172.31.21.135:22-209.38.146.62:44662.service: Deactivated successfully. Jan 30 13:56:41.240165 systemd[1]: Started sshd@75-172.31.21.135:22-209.38.146.62:44678.service - OpenSSH per-connection server daemon (209.38.146.62:44678). Jan 30 13:56:41.362284 sshd[3255]: Connection closed by authenticating user root 209.38.146.62 port 44678 [preauth] Jan 30 13:56:41.364844 systemd[1]: sshd@75-172.31.21.135:22-209.38.146.62:44678.service: Deactivated successfully. Jan 30 13:56:41.419151 systemd[1]: Started sshd@76-172.31.21.135:22-209.38.146.62:44690.service - OpenSSH per-connection server daemon (209.38.146.62:44690). Jan 30 13:56:41.434047 systemd[1]: Started sshd@77-172.31.21.135:22-139.178.68.195:44158.service - OpenSSH per-connection server daemon (139.178.68.195:44158). Jan 30 13:56:41.581640 sshd[3260]: Connection closed by authenticating user root 209.38.146.62 port 44690 [preauth] Jan 30 13:56:41.585547 systemd[1]: sshd@76-172.31.21.135:22-209.38.146.62:44690.service: Deactivated successfully. Jan 30 13:56:41.625137 systemd[1]: Started sshd@78-172.31.21.135:22-209.38.146.62:44706.service - OpenSSH per-connection server daemon (209.38.146.62:44706). Jan 30 13:56:41.647341 sshd[3262]: Accepted publickey for core from 139.178.68.195 port 44158 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:41.649454 sshd[3262]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:41.654756 systemd-logind[1878]: New session 6 of user core. Jan 30 13:56:41.661940 systemd[1]: Started session-6.scope - Session 6 of User core. Jan 30 13:56:41.763339 sshd[3268]: Connection closed by authenticating user root 209.38.146.62 port 44706 [preauth] Jan 30 13:56:41.765873 systemd[1]: sshd@78-172.31.21.135:22-209.38.146.62:44706.service: Deactivated successfully. Jan 30 13:56:41.785481 sshd[3262]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:41.792702 systemd[1]: sshd@77-172.31.21.135:22-139.178.68.195:44158.service: Deactivated successfully. Jan 30 13:56:41.794674 systemd[1]: session-6.scope: Deactivated successfully. Jan 30 13:56:41.798879 systemd-logind[1878]: Session 6 logged out. Waiting for processes to exit. Jan 30 13:56:41.803121 systemd[1]: Started sshd@79-172.31.21.135:22-209.38.146.62:44708.service - OpenSSH per-connection server daemon (209.38.146.62:44708). Jan 30 13:56:41.823574 systemd-logind[1878]: Removed session 6. Jan 30 13:56:41.829836 systemd[1]: Started sshd@80-172.31.21.135:22-139.178.68.195:44162.service - OpenSSH per-connection server daemon (139.178.68.195:44162). Jan 30 13:56:41.943556 sshd[3277]: Connection closed by authenticating user root 209.38.146.62 port 44708 [preauth] Jan 30 13:56:41.946664 systemd[1]: sshd@79-172.31.21.135:22-209.38.146.62:44708.service: Deactivated successfully. Jan 30 13:56:41.986884 systemd[1]: Started sshd@81-172.31.21.135:22-209.38.146.62:44718.service - OpenSSH per-connection server daemon (209.38.146.62:44718). Jan 30 13:56:41.989803 sshd[3279]: Accepted publickey for core from 139.178.68.195 port 44162 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:41.992144 sshd[3279]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:42.001694 systemd-logind[1878]: New session 7 of user core. Jan 30 13:56:42.003416 systemd[1]: Started session-7.scope - Session 7 of User core. Jan 30 13:56:42.131427 sshd[3279]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:42.136606 sshd[3285]: Connection closed by authenticating user root 209.38.146.62 port 44718 [preauth] Jan 30 13:56:42.137327 systemd[1]: sshd@80-172.31.21.135:22-139.178.68.195:44162.service: Deactivated successfully. Jan 30 13:56:42.142804 systemd[1]: sshd@81-172.31.21.135:22-209.38.146.62:44718.service: Deactivated successfully. Jan 30 13:56:42.145784 systemd[1]: session-7.scope: Deactivated successfully. Jan 30 13:56:42.147571 systemd-logind[1878]: Session 7 logged out. Waiting for processes to exit. Jan 30 13:56:42.149508 systemd-logind[1878]: Removed session 7. Jan 30 13:56:42.185252 systemd[1]: Started sshd@82-172.31.21.135:22-139.178.68.195:44168.service - OpenSSH per-connection server daemon (139.178.68.195:44168). Jan 30 13:56:42.189249 systemd[1]: Started sshd@83-172.31.21.135:22-209.38.146.62:44730.service - OpenSSH per-connection server daemon (209.38.146.62:44730). Jan 30 13:56:42.332059 sshd[3296]: Connection closed by authenticating user root 209.38.146.62 port 44730 [preauth] Jan 30 13:56:42.334831 systemd[1]: sshd@83-172.31.21.135:22-209.38.146.62:44730.service: Deactivated successfully. Jan 30 13:56:42.360154 sshd[3295]: Accepted publickey for core from 139.178.68.195 port 44168 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:42.361727 sshd[3295]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:42.377171 systemd[1]: Started sshd@84-172.31.21.135:22-209.38.146.62:44734.service - OpenSSH per-connection server daemon (209.38.146.62:44734). Jan 30 13:56:42.387640 systemd-logind[1878]: New session 8 of user core. Jan 30 13:56:42.390918 systemd[1]: Started session-8.scope - Session 8 of User core. Jan 30 13:56:42.516184 sshd[3295]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:42.520243 systemd[1]: sshd@82-172.31.21.135:22-139.178.68.195:44168.service: Deactivated successfully. Jan 30 13:56:42.533775 sshd[3302]: Connection closed by authenticating user root 209.38.146.62 port 44734 [preauth] Jan 30 13:56:42.534377 systemd[1]: session-8.scope: Deactivated successfully. Jan 30 13:56:42.550007 systemd[1]: sshd@84-172.31.21.135:22-209.38.146.62:44734.service: Deactivated successfully. Jan 30 13:56:42.555701 systemd-logind[1878]: Session 8 logged out. Waiting for processes to exit. Jan 30 13:56:42.578381 systemd-logind[1878]: Removed session 8. Jan 30 13:56:42.584485 systemd[1]: Started sshd@85-172.31.21.135:22-139.178.68.195:44176.service - OpenSSH per-connection server daemon (139.178.68.195:44176). Jan 30 13:56:42.590827 systemd[1]: Started sshd@86-172.31.21.135:22-209.38.146.62:44736.service - OpenSSH per-connection server daemon (209.38.146.62:44736). Jan 30 13:56:42.720156 sshd[3313]: Connection closed by authenticating user root 209.38.146.62 port 44736 [preauth] Jan 30 13:56:42.729296 systemd[1]: sshd@86-172.31.21.135:22-209.38.146.62:44736.service: Deactivated successfully. Jan 30 13:56:42.753558 sshd[3312]: Accepted publickey for core from 139.178.68.195 port 44176 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:42.756585 sshd[3312]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:42.783115 systemd[1]: Started sshd@87-172.31.21.135:22-209.38.146.62:44742.service - OpenSSH per-connection server daemon (209.38.146.62:44742). Jan 30 13:56:42.791276 systemd-logind[1878]: New session 9 of user core. Jan 30 13:56:42.799979 systemd[1]: Started session-9.scope - Session 9 of User core. Jan 30 13:56:42.920029 sudo[3322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jan 30 13:56:42.920454 sudo[3322]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Jan 30 13:56:42.929841 sshd[3319]: Connection closed by authenticating user root 209.38.146.62 port 44742 [preauth] Jan 30 13:56:42.935436 systemd[1]: sshd@87-172.31.21.135:22-209.38.146.62:44742.service: Deactivated successfully. Jan 30 13:56:42.938437 sudo[3322]: pam_unix(sudo:session): session closed for user root Jan 30 13:56:42.964140 sshd[3312]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:42.978225 systemd[1]: Started sshd@88-172.31.21.135:22-209.38.146.62:44758.service - OpenSSH per-connection server daemon (209.38.146.62:44758). Jan 30 13:56:42.979330 systemd[1]: sshd@85-172.31.21.135:22-139.178.68.195:44176.service: Deactivated successfully. Jan 30 13:56:42.989065 systemd[1]: session-9.scope: Deactivated successfully. Jan 30 13:56:42.992995 systemd-logind[1878]: Session 9 logged out. Waiting for processes to exit. Jan 30 13:56:43.006987 systemd[1]: Started sshd@89-172.31.21.135:22-139.178.68.195:44190.service - OpenSSH per-connection server daemon (139.178.68.195:44190). Jan 30 13:56:43.008849 systemd-logind[1878]: Removed session 9. Jan 30 13:56:43.110718 sshd[3327]: Connection closed by authenticating user root 209.38.146.62 port 44758 [preauth] Jan 30 13:56:43.113102 systemd[1]: sshd@88-172.31.21.135:22-209.38.146.62:44758.service: Deactivated successfully. Jan 30 13:56:43.152092 systemd[1]: Started sshd@90-172.31.21.135:22-209.38.146.62:44768.service - OpenSSH per-connection server daemon (209.38.146.62:44768). Jan 30 13:56:43.171059 sshd[3332]: Accepted publickey for core from 139.178.68.195 port 44190 ssh2: RSA SHA256:sOLO7fjvEAJcFfGBVs/wB6N/GT+9eFp4KClrVR9nxhs Jan 30 13:56:43.179717 sshd[3332]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Jan 30 13:56:43.184839 systemd-logind[1878]: New session 10 of user core. Jan 30 13:56:43.192953 systemd[1]: Started session-10.scope - Session 10 of User core. Jan 30 13:56:43.274290 sshd[3337]: Connection closed by authenticating user root 209.38.146.62 port 44768 [preauth] Jan 30 13:56:43.277208 systemd[1]: sshd@90-172.31.21.135:22-209.38.146.62:44768.service: Deactivated successfully. Jan 30 13:56:43.290109 sudo[3343]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jan 30 13:56:43.290584 sudo[3343]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Jan 30 13:56:43.303445 sudo[3343]: pam_unix(sudo:session): session closed for user root Jan 30 13:56:43.318627 sudo[3342]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jan 30 13:56:43.319917 sudo[3342]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Jan 30 13:56:43.334334 systemd[1]: Started sshd@91-172.31.21.135:22-209.38.146.62:44784.service - OpenSSH per-connection server daemon (209.38.146.62:44784). Jan 30 13:56:43.357152 systemd[1]: Stopping audit-rules.service - Load Security Auditing Rules... Jan 30 13:56:43.382045 auditctl[3348]: No rules Jan 30 13:56:43.390407 systemd[1]: audit-rules.service: Deactivated successfully. Jan 30 13:56:43.390741 systemd[1]: Stopped audit-rules.service - Load Security Auditing Rules. Jan 30 13:56:43.403449 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Jan 30 13:56:43.444884 augenrules[3367]: No rules Jan 30 13:56:43.445647 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Jan 30 13:56:43.447016 sudo[3342]: pam_unix(sudo:session): session closed for user root Jan 30 13:56:43.469559 sshd[3332]: pam_unix(sshd:session): session closed for user core Jan 30 13:56:43.475095 systemd[1]: sshd@89-172.31.21.135:22-139.178.68.195:44190.service: Deactivated successfully. Jan 30 13:56:43.479658 systemd[1]: session-10.scope: Deactivated successfully. Jan 30 13:56:43.483617 systemd-logind[1878]: Session 10 logged out. Waiting for processes to exit. Jan 30 13:56:43.485718 sshd[3346]: Connection closed by authenticating user root 209.38.146.62 port 44784 [preauth] Jan 30 13:56:43.486121 systemd-logind[1878]: Removed session 10. Jan 30 13:56:43.491575 systemd[1]: sshd@91-172.31.21.135:22-209.38.146.62:44784.service: Deactivated successfully. Jan 30 13:56:43.531092 systemd[1]: Started sshd@92-172.31.21.135:22-209.38.146.62:44798.service - OpenSSH per-connection server daemon (209.38.146.62:44798). Jan 30 13:56:43.658587 sshd[3377]: Connection closed by authenticating user root 209.38.146.62 port 44798 [preauth] Jan 30 13:56:43.661142 systemd[1]: sshd@92-172.31.21.135:22-209.38.146.62:44798.service: Deactivated successfully. Jan 30 13:56:43.701946 systemd[1]: Started sshd@93-172.31.21.135:22-209.38.146.62:44804.service - OpenSSH per-connection server daemon (209.38.146.62:44804). Jan 30 13:56:43.845751 sshd[3382]: Connection closed by authenticating user root 209.38.146.62 port 44804 [preauth] Jan 30 13:56:43.849306 systemd[1]: sshd@93-172.31.21.135:22-209.38.146.62:44804.service: Deactivated successfully. Jan 30 13:56:43.891641 systemd[1]: Started sshd@94-172.31.21.135:22-209.38.146.62:44814.service - OpenSSH per-connection server daemon (209.38.146.62:44814). Jan 30 13:56:44.019155 sshd[3387]: Connection closed by authenticating user root 209.38.146.62 port 44814 [preauth] Jan 30 13:56:44.021482 systemd[1]: sshd@94-172.31.21.135:22-209.38.146.62:44814.service: Deactivated successfully. Jan 30 13:56:44.062066 systemd[1]: Started sshd@95-172.31.21.135:22-209.38.146.62:44816.service - OpenSSH per-connection server daemon (209.38.146.62:44816). Jan 30 13:56:44.185405 sshd[3392]: Connection closed by authenticating user root 209.38.146.62 port 44816 [preauth] Jan 30 13:56:44.188288 systemd[1]: sshd@95-172.31.21.135:22-209.38.146.62:44816.service: Deactivated successfully. Jan 30 13:56:44.191966 systemd[1]: flanneld.service: Scheduled restart job, restart counter is at 1. Jan 30 13:56:44.193630 systemd[1]: etcd-member.service: Scheduled restart job, restart counter is at 1. Jan 30 13:56:44.200073 systemd[1]: Stopping flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jan 30 13:56:44.216428 systemd[1]: Started sshd@96-172.31.21.135:22-209.38.146.62:44824.service - OpenSSH per-connection server daemon (209.38.146.62:44824). Jan 30 13:56:44.231209 docker[3396]: flannel-docker-opts Jan 30 13:56:44.278719 docker[3404]: flannel-docker-opts Jan 30 13:56:44.281257 systemd[1]: flannel-docker-opts.service: Deactivated successfully. Jan 30 13:56:44.281956 systemd[1]: Stopped flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jan 30 13:56:44.283767 systemd[1]: Stopped flanneld.service - flannel - Network fabric for containers (System Application Container). Jan 30 13:56:44.290061 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Jan 30 13:56:44.299327 (-wrapper)[3411]: etcd-member.service: Referenced but unset environment variable evaluates to an empty string: ETCD_OPTS Jan 30 13:56:44.328963 etcd-wrapper[3415]: Error response from daemon: No such container: etcd-member Jan 30 13:56:44.355839 etcd-wrapper[3420]: Error response from daemon: No such container: etcd-member Jan 30 13:56:44.360136 sshd[3402]: Connection closed by authenticating user root 209.38.146.62 port 44824 [preauth] Jan 30 13:56:44.361265 systemd[1]: sshd@96-172.31.21.135:22-209.38.146.62:44824.service: Deactivated successfully. Jan 30 13:56:44.401152 systemd[1]: Started sshd@97-172.31.21.135:22-209.38.146.62:44834.service - OpenSSH per-connection server daemon (209.38.146.62:44834). Jan 30 13:56:44.505442 systemd[1]: run-docker-netns-default.mount: Deactivated successfully. Jan 30 13:56:44.549247 sshd[3443]: Connection closed by authenticating user root 209.38.146.62 port 44834 [preauth] Jan 30 13:56:44.552026 systemd[1]: sshd@97-172.31.21.135:22-209.38.146.62:44834.service: Deactivated successfully. Jan 30 13:56:44.589705 containerd[1902]: time="2025-01-30T13:56:44.588936102Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jan 30 13:56:44.589705 containerd[1902]: time="2025-01-30T13:56:44.589002903Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jan 30 13:56:44.589705 containerd[1902]: time="2025-01-30T13:56:44.589027198Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:44.589705 containerd[1902]: time="2025-01-30T13:56:44.589138255Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:44.597114 systemd[1]: Started sshd@98-172.31.21.135:22-209.38.146.62:44840.service - OpenSSH per-connection server daemon (209.38.146.62:44840). Jan 30 13:56:44.630043 systemd[1]: Started docker-30fe162d49cfe7af07080db4a81f34e230618853691f2f274c48f6da83995611.scope - libcontainer container 30fe162d49cfe7af07080db4a81f34e230618853691f2f274c48f6da83995611. Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"info","ts":1738245404.7018292,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"info","ts":1738245404.701899,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"ec2df8485e43c537d6435d556a7973a9"} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"warn","ts":1738245404.7019231,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"warn","ts":1738245404.70193,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"warn","ts":1738245404.701935,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"warn","ts":1738245404.7019398,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.701Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://172.31.21.135:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://172.31.21.135:2380","--advertise-client-urls=http://172.31.21.135:2379","--discovery=https://discovery.etcd.io/9a211bf92c11c6496b4e208ee417249a","--enable-v2=true"]} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.702Z","caller":"etcdmain/etcd.go:115","msg":"server has been already initialized","data-dir":"/var/lib/etcd","dir-type":"member"} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.702Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://172.31.21.135:2380"]} Jan 30 13:56:44.705134 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.702Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Jan 30 13:56:44.706204 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.702Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":2,"max-cpu-available":2,"member-initialized":true,"name":"ec2df8485e43c537d6435d556a7973a9","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://172.31.21.135:2380"],"listen-peer-urls":["http://172.31.21.135:2380"],"advertise-client-urls":["http://172.31.21.135:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"","initial-cluster-state":"new","initial-cluster-token":"","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/9a211bf92c11c6496b4e208ee417249a","discovery-proxy":"","downgrade-check-interval":"5s"} Jan 30 13:56:44.706204 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.702Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"212.078µs"} Jan 30 13:56:44.706204 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:44.702Z","caller":"etcdserver/server.go:480","msg":"discovery token is ignored since cluster already initialized; valid logs are found","wal-dir":"/var/lib/etcd/member/wal"} Jan 30 13:56:44.706204 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.703Z","caller":"etcdserver/server.go:526","msg":"No snapshot found. Recovering WAL from scratch!"} Jan 30 13:56:44.706204 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.703Z","caller":"etcdserver/raft.go:483","msg":"restarting local member","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","commit-index":25} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.703Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=()"} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.703Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became follower at term 2"} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.703Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8afdd45dfef98e56 [peers: [], term: 2, commit: 25, applied: 0, lastindex: 25, lastterm: 2]"} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.704Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.704Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","recovered-remote-peer-id":"8afdd45dfef98e56","recovered-remote-peer-urls":["http://172.31.21.135:2380"]} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.704Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","recovered-remote-peer-id":"b1da9f7a3bcbf26a","recovered-remote-peer-urls":["http://172.31.22.227:2380"]} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.704Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","recovered-remote-peer-id":"d3302519065413e2","recovered-remote-peer-urls":["http://172.31.18.87:2380"]} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.704Z","caller":"membership/cluster.go:285","msg":"set cluster version from store","cluster-version":"3.5"} Jan 30 13:56:44.706399 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:44.705Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jan 30 13:56:44.707700 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.707Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jan 30 13:56:44.708652 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.708Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jan 30 13:56:44.709647 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.709Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.709876 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.709Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.711990 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.711Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.711990 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.711Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.712963 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.712Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.712963 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.712Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.712963 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.712Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a","remote-peer-urls":["http://172.31.22.227:2380"]} Jan 30 13:56:44.712963 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.712Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.712963 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.712Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.713732 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.713Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.717849 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.715Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.717849 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.715Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.717849 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.715Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.717849 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.715Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.718150 sshd[3470]: Invalid user user from 209.38.146.62 port 44840 Jan 30 13:56:44.719233 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.718Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.719628 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.719Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.720014 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.719Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2","remote-peer-urls":["http://172.31.18.87:2380"]} Jan 30 13:56:44.720314 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.719Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.720587 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.720Z","caller":"etcdserver/server.go:834","msg":"starting etcd server","local-member-id":"8afdd45dfef98e56","local-server-version":"3.5.0","cluster-id":"3d06b4668b670fe3","cluster-version":"3.5"} Jan 30 13:56:44.721059 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.719Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.721354 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.721Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Jan 30 13:56:44.721618 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.721Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942)"} Jan 30 13:56:44.721915 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.721Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","added-peer-id":"8afdd45dfef98e56","added-peer-peer-urls":["http://172.31.21.135:2380"]} Jan 30 13:56:44.721915 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.721Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942 12815731036974215786)"} Jan 30 13:56:44.723828 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.722Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","added-peer-id":"b1da9f7a3bcbf26a","added-peer-peer-urls":["http://172.31.22.227:2380"]} Jan 30 13:56:44.723828 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.723Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 switched to configuration voters=(10015394646516665942 12815731036974215786 15217703930295489506)"} Jan 30 13:56:44.723828 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.723Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","added-peer-id":"d3302519065413e2","added-peer-peer-urls":["http://172.31.18.87:2380"]} Jan 30 13:56:44.723828 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.723Z","caller":"membership/cluster.go:523","msg":"updated cluster version","cluster-id":"3d06b4668b670fe3","local-member-id":"8afdd45dfef98e56","from":"3.5","to":"3.5"} Jan 30 13:56:44.723828 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.723Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"d3302519065413e2"} Jan 30 13:56:44.723828 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.723Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.724645 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.724Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.725366 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:44.725Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Jan 30 13:56:44.725525 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.725Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"172.31.21.135:2380"} Jan 30 13:56:44.725525 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.725Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"172.31.21.135:2380"} Jan 30 13:56:44.725850 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.725Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8afdd45dfef98e56","initial-advertise-peer-urls":["http://172.31.21.135:2380"],"listen-peer-urls":["http://172.31.21.135:2380"],"advertise-client-urls":["http://172.31.21.135:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Jan 30 13:56:44.739548 sshd[3470]: Connection closed by invalid user user 209.38.146.62 port 44840 [preauth] Jan 30 13:56:44.741837 systemd[1]: sshd@98-172.31.21.135:22-209.38.146.62:44840.service: Deactivated successfully. Jan 30 13:56:44.754129 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.752Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"d3302519065413e2","stream-type":"stream Message"} Jan 30 13:56:44.754129 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.753Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.754129 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.753Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"d3302519065413e2","stream-type":"stream MsgApp v2"} Jan 30 13:56:44.754129 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.753Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:56:44.773531 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.773Z","caller":"etcdserver/server.go:767","msg":"initialized peer connections; fast-forwarding election ticks","local-member-id":"8afdd45dfef98e56","forward-ticks":8,"forward-duration":"800ms","election-ticks":10,"election-timeout":"1s","active-remote-members":2} Jan 30 13:56:44.797715 systemd[1]: Started sshd@99-172.31.21.135:22-209.38.146.62:44852.service - OpenSSH per-connection server daemon (209.38.146.62:44852). Jan 30 13:56:44.801006 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.792Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"b1da9f7a3bcbf26a","stream-type":"stream Message"} Jan 30 13:56:44.801006 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.792Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.801006 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.793Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"b1da9f7a3bcbf26a","stream-type":"stream MsgApp v2"} Jan 30 13:56:44.801006 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.793Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:44.812194 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.810Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 2, index: 25, vote: d3302519065413e2] cast MsgPreVote for b1da9f7a3bcbf26a [logterm: 3, index: 32] at term 2"} Jan 30 13:56:44.812194 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [term: 2] received a MsgVote message with higher term from b1da9f7a3bcbf26a [term: 4]"} Jan 30 13:56:44.812763 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became follower at term 4"} Jan 30 13:56:44.812763 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 2, index: 25, vote: 0] cast MsgVote for b1da9f7a3bcbf26a [logterm: 3, index: 32] at term 4"} Jan 30 13:56:44.814706 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.813Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8afdd45dfef98e56 elected leader b1da9f7a3bcbf26a at term 4"} Jan 30 13:56:44.822233 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.821Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8afdd45dfef98e56","local-member-attributes":"{Name:ec2df8485e43c537d6435d556a7973a9 ClientURLs:[http://172.31.21.135:2379]}","request-path":"/0/members/8afdd45dfef98e56/attributes","cluster-id":"3d06b4668b670fe3","publish-timeout":"7s"} Jan 30 13:56:44.822817 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.822Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jan 30 13:56:44.823068 systemd[1]: Started etcd-member.service - etcd (System Application Container). Jan 30 13:56:44.825668 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.822Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jan 30 13:56:44.828134 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.822Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jan 30 13:56:44.830834 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:44.829Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jan 30 13:56:44.831210 systemd[1]: Starting flanneld.service - flannel - Network fabric for containers (System Application Container)... Jan 30 13:56:44.865971 etcdctl[3508]: { "Network": "10.254.0.0/16", "Backend": {"Type": "udp"} } Jan 30 13:56:44.894958 flannel-wrapper[3515]: Error response from daemon: No such container: flannel Jan 30 13:56:44.911847 flannel-wrapper[3520]: Error response from daemon: No such container: flannel Jan 30 13:56:44.926869 sshd[3501]: Invalid user user from 209.38.146.62 port 44852 Jan 30 13:56:44.951602 sshd[3501]: Connection closed by invalid user user 209.38.146.62 port 44852 [preauth] Jan 30 13:56:44.956321 systemd[1]: sshd@99-172.31.21.135:22-209.38.146.62:44852.service: Deactivated successfully. Jan 30 13:56:45.009777 systemd[1]: Started sshd@100-172.31.21.135:22-209.38.146.62:44858.service - OpenSSH per-connection server daemon (209.38.146.62:44858). Jan 30 13:56:45.118774 containerd[1902]: time="2025-01-30T13:56:45.118278534Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jan 30 13:56:45.118774 containerd[1902]: time="2025-01-30T13:56:45.118372818Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jan 30 13:56:45.118774 containerd[1902]: time="2025-01-30T13:56:45.118396856Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:45.118774 containerd[1902]: time="2025-01-30T13:56:45.118534250Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:45.136980 sshd[3542]: Invalid user user from 209.38.146.62 port 44858 Jan 30 13:56:45.141005 systemd[1]: Started docker-f87d4f3bd2db7e07527036b49bb257bc249bd9a159db086c0715b615fa884c8b.scope - libcontainer container f87d4f3bd2db7e07527036b49bb257bc249bd9a159db086c0715b615fa884c8b. Jan 30 13:56:45.157788 sshd[3542]: Connection closed by invalid user user 209.38.146.62 port 44858 [preauth] Jan 30 13:56:45.159452 systemd[1]: sshd@100-172.31.21.135:22-209.38.146.62:44858.service: Deactivated successfully. Jan 30 13:56:45.199835 systemd[1]: Started sshd@101-172.31.21.135:22-209.38.146.62:44862.service - OpenSSH per-connection server daemon (209.38.146.62:44862). Jan 30 13:56:45.203849 flannel-wrapper[3534]: I0130 13:56:45.202006 1 main.go:520] Determining IP address of default interface Jan 30 13:56:45.203849 flannel-wrapper[3534]: I0130 13:56:45.202976 1 main.go:533] Using interface with name eth0 and address 172.31.21.135 Jan 30 13:56:45.203849 flannel-wrapper[3534]: I0130 13:56:45.203001 1 main.go:550] Defaulting external address to interface address (172.31.21.135) Jan 30 13:56:45.203849 flannel-wrapper[3534]: I0130 13:56:45.203143 1 main.go:254] Created subnet manager: Etcd Local Manager with Previous Subnet: 10.254.13.0/24 Jan 30 13:56:45.203849 flannel-wrapper[3534]: I0130 13:56:45.203149 1 main.go:257] Installing signal handlers Jan 30 13:56:45.210279 flannel-wrapper[3534]: I0130 13:56:45.210081 1 main.go:392] Found network config - Backend type: udp Jan 30 13:56:45.216437 flannel-wrapper[3534]: I0130 13:56:45.216227 1 local_manager.go:147] Found lease (10.254.13.0/24) for current IP (172.31.21.135), reusing Jan 30 13:56:45.227962 (udev-worker)[3599]: Network interface NamePolicy= disabled on kernel command line. Jan 30 13:56:45.228462 systemd-networkd[1741]: flannel0: Link UP Jan 30 13:56:45.228468 systemd-networkd[1741]: flannel0: Gained carrier Jan 30 13:56:45.228636 systemd-networkd[1741]: flannel0: Gained IPv6LL Jan 30 13:56:45.236155 flannel-wrapper[3534]: I0130 13:56:45.230754 1 main.go:307] Setting up masking rules Jan 30 13:56:45.273481 flannel-wrapper[3534]: I0130 13:56:45.273263 1 main.go:315] Changing default FORWARD chain policy to ACCEPT Jan 30 13:56:45.274163 flannel-wrapper[3534]: I0130 13:56:45.273991 1 main.go:323] Wrote subnet file to /run/flannel/subnet.env Jan 30 13:56:45.274163 flannel-wrapper[3534]: I0130 13:56:45.274006 1 main.go:327] Running backend. Jan 30 13:56:45.275042 systemd[1]: Started flanneld.service - flannel - Network fabric for containers (System Application Container). Jan 30 13:56:45.284249 flannel-wrapper[3534]: I0130 13:56:45.277656 1 udp_network_amd64.go:100] Watching for new subnet leases Jan 30 13:56:45.289122 systemd[1]: Starting flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container)... Jan 30 13:56:45.290601 flannel-wrapper[3534]: I0130 13:56:45.290383 1 main.go:439] Waiting for 22h59m59.928594129s to renew lease Jan 30 13:56:45.308346 sh[3627]: + for try in 1 2 3 4 5 6 Jan 30 13:56:45.308346 sh[3627]: + /usr/lib/coreos/flannel-wrapper -d /run/flannel/flannel_docker_opts.env -i Jan 30 13:56:45.309013 flannel-wrapper[3534]: I0130 13:56:45.307449 1 udp_network_amd64.go:196] Subnet added: 10.254.47.0/24 Jan 30 13:56:45.309013 flannel-wrapper[3534]: I0130 13:56:45.308039 1 udp_network_amd64.go:196] Subnet added: 10.254.20.0/24 Jan 30 13:56:45.312826 sshd[3597]: Invalid user user from 209.38.146.62 port 44862 Jan 30 13:56:45.328884 sh[3638]: Error response from daemon: No such container: flannel-docker-opts Jan 30 13:56:45.335908 sshd[3597]: Connection closed by invalid user user 209.38.146.62 port 44862 [preauth] Jan 30 13:56:45.336835 systemd[1]: sshd@101-172.31.21.135:22-209.38.146.62:44862.service: Deactivated successfully. Jan 30 13:56:45.344888 sh[3644]: Error response from daemon: No such container: flannel-docker-opts Jan 30 13:56:45.371071 systemd[1]: Started sshd@102-172.31.21.135:22-209.38.146.62:44878.service - OpenSSH per-connection server daemon (209.38.146.62:44878). Jan 30 13:56:45.377834 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:45.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [term: 4] received a MsgVote message with higher term from d3302519065413e2 [term: 5]"} Jan 30 13:56:45.377834 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:45.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became follower at term 5"} Jan 30 13:56:45.377834 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:45.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 4, index: 57, vote: 0] cast MsgVote for d3302519065413e2 [logterm: 4, index: 57] at term 5"} Jan 30 13:56:45.377834 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:45.375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8afdd45dfef98e56 lost leader b1da9f7a3bcbf26a at term 5"} Jan 30 13:56:45.379746 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:45.378Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8afdd45dfef98e56 elected leader d3302519065413e2 at term 5"} Jan 30 13:56:45.468158 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:45.467Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a","error":"EOF"} Jan 30 13:56:45.483095 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:45.482Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a","error":"EOF"} Jan 30 13:56:45.489417 sshd[3659]: Invalid user user from 209.38.146.62 port 44878 Jan 30 13:56:45.499727 containerd[1902]: time="2025-01-30T13:56:45.499041013Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jan 30 13:56:45.499727 containerd[1902]: time="2025-01-30T13:56:45.499100237Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jan 30 13:56:45.499727 containerd[1902]: time="2025-01-30T13:56:45.499120995Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:45.499727 containerd[1902]: time="2025-01-30T13:56:45.499221235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jan 30 13:56:45.510058 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:45.509Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"b1da9f7a3bcbf26a","error":"failed to dial b1da9f7a3bcbf26a on stream MsgApp v2 (peer b1da9f7a3bcbf26a failed to find local node 8afdd45dfef98e56)"} Jan 30 13:56:45.512281 sshd[3659]: Connection closed by invalid user user 209.38.146.62 port 44878 [preauth] Jan 30 13:56:45.519236 systemd[1]: sshd@102-172.31.21.135:22-209.38.146.62:44878.service: Deactivated successfully. Jan 30 13:56:45.531905 systemd[1]: Started docker-d77822f0dc4a048cdb4bafb21ce404935032a420b108d8a3d3ebd6654535ec3b.scope - libcontainer container d77822f0dc4a048cdb4bafb21ce404935032a420b108d8a3d3ebd6654535ec3b. Jan 30 13:56:45.546724 systemd[1]: Started sshd@103-172.31.21.135:22-209.38.146.62:44890.service - OpenSSH per-connection server daemon (209.38.146.62:44890). Jan 30 13:56:45.620451 systemd[1]: docker-d77822f0dc4a048cdb4bafb21ce404935032a420b108d8a3d3ebd6654535ec3b.scope: Deactivated successfully. Jan 30 13:56:45.637931 dockerd[2878]: time="2025-01-30T13:56:45.637183312Z" level=info msg="ignoring event" container=d77822f0dc4a048cdb4bafb21ce404935032a420b108d8a3d3ebd6654535ec3b module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jan 30 13:56:45.638910 containerd[1902]: time="2025-01-30T13:56:45.638407546Z" level=info msg="shim disconnected" id=d77822f0dc4a048cdb4bafb21ce404935032a420b108d8a3d3ebd6654535ec3b namespace=moby Jan 30 13:56:45.638910 containerd[1902]: time="2025-01-30T13:56:45.638470278Z" level=warning msg="cleaning up after shim disconnected" id=d77822f0dc4a048cdb4bafb21ce404935032a420b108d8a3d3ebd6654535ec3b namespace=moby Jan 30 13:56:45.638910 containerd[1902]: time="2025-01-30T13:56:45.638482593Z" level=info msg="cleaning up dead shim" namespace=moby Jan 30 13:56:45.659461 sshd[3700]: Invalid user user from 209.38.146.62 port 44890 Jan 30 13:56:45.669874 systemd[1]: var-lib-docker-overlay2-5a21e5f1211142d48f0360d2200d64a8d2d3a585aaebb467d38cc0ff746771e9-merged.mount: Deactivated successfully. Jan 30 13:56:45.680151 sshd[3700]: Connection closed by invalid user user 209.38.146.62 port 44890 [preauth] Jan 30 13:56:45.682404 systemd[1]: sshd@103-172.31.21.135:22-209.38.146.62:44890.service: Deactivated successfully. Jan 30 13:56:45.688322 sh[3627]: + break Jan 30 13:56:45.688322 sh[3627]: + '[' 1 '!=' fail ']' Jan 30 13:56:45.689567 systemd[1]: Finished flannel-docker-opts.service - flannel docker export service - Network fabric for containers (System Application Container). Jan 30 13:56:45.718113 systemd[1]: Started sshd@104-172.31.21.135:22-209.38.146.62:44892.service - OpenSSH per-connection server daemon (209.38.146.62:44892). Jan 30 13:56:45.816199 sshd[3747]: Invalid user user from 209.38.146.62 port 44892 Jan 30 13:56:45.836953 sshd[3747]: Connection closed by invalid user user 209.38.146.62 port 44892 [preauth] Jan 30 13:56:45.839840 systemd[1]: sshd@104-172.31.21.135:22-209.38.146.62:44892.service: Deactivated successfully. Jan 30 13:56:45.873106 systemd[1]: Started sshd@105-172.31.21.135:22-209.38.146.62:44906.service - OpenSSH per-connection server daemon (209.38.146.62:44906). Jan 30 13:56:45.998913 sshd[3752]: Invalid user user from 209.38.146.62 port 44906 Jan 30 13:56:46.020554 sshd[3752]: Connection closed by invalid user user 209.38.146.62 port 44906 [preauth] Jan 30 13:56:46.023108 systemd[1]: sshd@105-172.31.21.135:22-209.38.146.62:44906.service: Deactivated successfully. Jan 30 13:56:46.058925 systemd[1]: Started sshd@106-172.31.21.135:22-209.38.146.62:44918.service - OpenSSH per-connection server daemon (209.38.146.62:44918). Jan 30 13:56:46.174272 sshd[3757]: Invalid user user from 209.38.146.62 port 44918 Jan 30 13:56:46.195034 sshd[3757]: Connection closed by invalid user user 209.38.146.62 port 44918 [preauth] Jan 30 13:56:46.197783 systemd[1]: sshd@106-172.31.21.135:22-209.38.146.62:44918.service: Deactivated successfully. Jan 30 13:56:46.242312 systemd[1]: Started sshd@107-172.31.21.135:22-209.38.146.62:44928.service - OpenSSH per-connection server daemon (209.38.146.62:44928). Jan 30 13:56:46.386613 sshd[3762]: Invalid user user from 209.38.146.62 port 44928 Jan 30 13:56:46.407736 sshd[3762]: Connection closed by invalid user user 209.38.146.62 port 44928 [preauth] Jan 30 13:56:46.410813 systemd[1]: sshd@107-172.31.21.135:22-209.38.146.62:44928.service: Deactivated successfully. Jan 30 13:56:46.453106 systemd[1]: Started sshd@108-172.31.21.135:22-209.38.146.62:44930.service - OpenSSH per-connection server daemon (209.38.146.62:44930). Jan 30 13:56:46.557730 sshd[3767]: Invalid user user from 209.38.146.62 port 44930 Jan 30 13:56:46.578841 sshd[3767]: Connection closed by invalid user user 209.38.146.62 port 44930 [preauth] Jan 30 13:56:46.585454 systemd[1]: sshd@108-172.31.21.135:22-209.38.146.62:44930.service: Deactivated successfully. Jan 30 13:56:46.616213 systemd[1]: Started sshd@109-172.31.21.135:22-209.38.146.62:44940.service - OpenSSH per-connection server daemon (209.38.146.62:44940). Jan 30 13:56:46.731503 sshd[3772]: Invalid user user from 209.38.146.62 port 44940 Jan 30 13:56:46.752582 sshd[3772]: Connection closed by invalid user user 209.38.146.62 port 44940 [preauth] Jan 30 13:56:46.755078 systemd[1]: sshd@109-172.31.21.135:22-209.38.146.62:44940.service: Deactivated successfully. Jan 30 13:56:46.791107 systemd[1]: Started sshd@110-172.31.21.135:22-209.38.146.62:44950.service - OpenSSH per-connection server daemon (209.38.146.62:44950). Jan 30 13:56:46.927502 sshd[3777]: Invalid user user from 209.38.146.62 port 44950 Jan 30 13:56:46.949324 sshd[3777]: Connection closed by invalid user user 209.38.146.62 port 44950 [preauth] Jan 30 13:56:46.951941 systemd[1]: sshd@110-172.31.21.135:22-209.38.146.62:44950.service: Deactivated successfully. Jan 30 13:56:46.991083 systemd[1]: Started sshd@111-172.31.21.135:22-209.38.146.62:44952.service - OpenSSH per-connection server daemon (209.38.146.62:44952). Jan 30 13:56:47.096451 sshd[3782]: Invalid user user from 209.38.146.62 port 44952 Jan 30 13:56:47.117434 sshd[3782]: Connection closed by invalid user user 209.38.146.62 port 44952 [preauth] Jan 30 13:56:47.120442 systemd[1]: sshd@111-172.31.21.135:22-209.38.146.62:44952.service: Deactivated successfully. Jan 30 13:56:47.155067 systemd[1]: Started sshd@112-172.31.21.135:22-209.38.146.62:49474.service - OpenSSH per-connection server daemon (209.38.146.62:49474). Jan 30 13:56:47.263550 sshd[3787]: Invalid user user from 209.38.146.62 port 49474 Jan 30 13:56:47.284306 sshd[3787]: Connection closed by invalid user user 209.38.146.62 port 49474 [preauth] Jan 30 13:56:47.286879 systemd[1]: sshd@112-172.31.21.135:22-209.38.146.62:49474.service: Deactivated successfully. Jan 30 13:56:47.320442 systemd[1]: Started sshd@113-172.31.21.135:22-209.38.146.62:49476.service - OpenSSH per-connection server daemon (209.38.146.62:49476). Jan 30 13:56:47.432891 sshd[3792]: Invalid user user from 209.38.146.62 port 49476 Jan 30 13:56:47.458997 sshd[3792]: Connection closed by invalid user user 209.38.146.62 port 49476 [preauth] Jan 30 13:56:47.461477 systemd[1]: sshd@113-172.31.21.135:22-209.38.146.62:49476.service: Deactivated successfully. Jan 30 13:56:47.503116 systemd[1]: Started sshd@114-172.31.21.135:22-209.38.146.62:49486.service - OpenSSH per-connection server daemon (209.38.146.62:49486). Jan 30 13:56:47.626289 sshd[3797]: Invalid user user from 209.38.146.62 port 49486 Jan 30 13:56:47.647422 sshd[3797]: Connection closed by invalid user user 209.38.146.62 port 49486 [preauth] Jan 30 13:56:47.650201 systemd[1]: sshd@114-172.31.21.135:22-209.38.146.62:49486.service: Deactivated successfully. Jan 30 13:56:47.684080 systemd[1]: Started sshd@115-172.31.21.135:22-209.38.146.62:49494.service - OpenSSH per-connection server daemon (209.38.146.62:49494). Jan 30 13:56:47.801167 sshd[3802]: Invalid user user from 209.38.146.62 port 49494 Jan 30 13:56:47.822200 sshd[3802]: Connection closed by invalid user user 209.38.146.62 port 49494 [preauth] Jan 30 13:56:47.825140 systemd[1]: sshd@115-172.31.21.135:22-209.38.146.62:49494.service: Deactivated successfully. Jan 30 13:56:47.853679 systemd[1]: Started sshd@116-172.31.21.135:22-209.38.146.62:49504.service - OpenSSH per-connection server daemon (209.38.146.62:49504). Jan 30 13:56:47.985471 sshd[3807]: Invalid user user from 209.38.146.62 port 49504 Jan 30 13:56:48.011864 sshd[3807]: Connection closed by invalid user user 209.38.146.62 port 49504 [preauth] Jan 30 13:56:48.017327 systemd[1]: sshd@116-172.31.21.135:22-209.38.146.62:49504.service: Deactivated successfully. Jan 30 13:56:48.068382 systemd[1]: Started sshd@117-172.31.21.135:22-209.38.146.62:49520.service - OpenSSH per-connection server daemon (209.38.146.62:49520). Jan 30 13:56:48.181363 sshd[3812]: Invalid user user from 209.38.146.62 port 49520 Jan 30 13:56:48.198667 ntpd[1869]: Listen normally on 7 flannel0 10.254.13.0:123 Jan 30 13:56:48.198776 ntpd[1869]: Listen normally on 8 flannel0 [fe80::be7e:cecc:2252:41bd%5]:123 Jan 30 13:56:48.199233 ntpd[1869]: 30 Jan 13:56:48 ntpd[1869]: Listen normally on 7 flannel0 10.254.13.0:123 Jan 30 13:56:48.199233 ntpd[1869]: 30 Jan 13:56:48 ntpd[1869]: Listen normally on 8 flannel0 [fe80::be7e:cecc:2252:41bd%5]:123 Jan 30 13:56:48.202357 sshd[3812]: Connection closed by invalid user user 209.38.146.62 port 49520 [preauth] Jan 30 13:56:48.205250 systemd[1]: sshd@117-172.31.21.135:22-209.38.146.62:49520.service: Deactivated successfully. Jan 30 13:56:48.258696 systemd[1]: Started sshd@118-172.31.21.135:22-209.38.146.62:49526.service - OpenSSH per-connection server daemon (209.38.146.62:49526). Jan 30 13:56:48.381119 sshd[3817]: Invalid user user from 209.38.146.62 port 49526 Jan 30 13:56:48.402083 sshd[3817]: Connection closed by invalid user user 209.38.146.62 port 49526 [preauth] Jan 30 13:56:48.405103 systemd[1]: sshd@118-172.31.21.135:22-209.38.146.62:49526.service: Deactivated successfully. Jan 30 13:56:48.442160 systemd[1]: Started sshd@119-172.31.21.135:22-209.38.146.62:49530.service - OpenSSH per-connection server daemon (209.38.146.62:49530). Jan 30 13:56:48.449533 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 30 13:56:48.555070 sshd[3822]: Invalid user user from 209.38.146.62 port 49530 Jan 30 13:56:48.575515 sshd[3822]: Connection closed by invalid user user 209.38.146.62 port 49530 [preauth] Jan 30 13:56:48.578854 systemd[1]: sshd@119-172.31.21.135:22-209.38.146.62:49530.service: Deactivated successfully. Jan 30 13:56:48.612611 systemd[1]: Started sshd@120-172.31.21.135:22-209.38.146.62:49536.service - OpenSSH per-connection server daemon (209.38.146.62:49536). Jan 30 13:56:48.740055 sshd[3830]: Invalid user user from 209.38.146.62 port 49536 Jan 30 13:56:48.762148 sshd[3830]: Connection closed by invalid user user 209.38.146.62 port 49536 [preauth] Jan 30 13:56:48.766048 systemd[1]: sshd@120-172.31.21.135:22-209.38.146.62:49536.service: Deactivated successfully. Jan 30 13:56:48.791970 systemd[1]: Started sshd@121-172.31.21.135:22-209.38.146.62:49540.service - OpenSSH per-connection server daemon (209.38.146.62:49540). Jan 30 13:56:48.931945 sshd[3835]: Invalid user user from 209.38.146.62 port 49540 Jan 30 13:56:48.958795 sshd[3835]: Connection closed by invalid user user 209.38.146.62 port 49540 [preauth] Jan 30 13:56:48.962131 systemd[1]: sshd@121-172.31.21.135:22-209.38.146.62:49540.service: Deactivated successfully. Jan 30 13:56:48.999777 systemd[1]: Started sshd@122-172.31.21.135:22-209.38.146.62:49554.service - OpenSSH per-connection server daemon (209.38.146.62:49554). Jan 30 13:56:49.133866 sshd[3840]: Invalid user user from 209.38.146.62 port 49554 Jan 30 13:56:49.155193 sshd[3840]: Connection closed by invalid user user 209.38.146.62 port 49554 [preauth] Jan 30 13:56:49.161066 systemd[1]: sshd@122-172.31.21.135:22-209.38.146.62:49554.service: Deactivated successfully. Jan 30 13:56:49.191418 systemd[1]: Started sshd@123-172.31.21.135:22-209.38.146.62:49570.service - OpenSSH per-connection server daemon (209.38.146.62:49570). Jan 30 13:56:49.310099 sshd[3845]: Invalid user user from 209.38.146.62 port 49570 Jan 30 13:56:49.331400 sshd[3845]: Connection closed by invalid user user 209.38.146.62 port 49570 [preauth] Jan 30 13:56:49.333991 systemd[1]: sshd@123-172.31.21.135:22-209.38.146.62:49570.service: Deactivated successfully. Jan 30 13:56:49.369573 systemd[1]: Started sshd@124-172.31.21.135:22-209.38.146.62:49576.service - OpenSSH per-connection server daemon (209.38.146.62:49576). Jan 30 13:56:49.479510 sshd[3850]: Invalid user user from 209.38.146.62 port 49576 Jan 30 13:56:49.500274 sshd[3850]: Connection closed by invalid user user 209.38.146.62 port 49576 [preauth] Jan 30 13:56:49.505498 systemd[1]: sshd@124-172.31.21.135:22-209.38.146.62:49576.service: Deactivated successfully. Jan 30 13:56:49.531839 systemd[1]: Started sshd@125-172.31.21.135:22-209.38.146.62:49580.service - OpenSSH per-connection server daemon (209.38.146.62:49580). Jan 30 13:56:49.664813 sshd[3855]: Invalid user user from 209.38.146.62 port 49580 Jan 30 13:56:49.686087 sshd[3855]: Connection closed by invalid user user 209.38.146.62 port 49580 [preauth] Jan 30 13:56:49.688911 systemd[1]: sshd@125-172.31.21.135:22-209.38.146.62:49580.service: Deactivated successfully. Jan 30 13:56:49.716453 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:49.715Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"0s","error":"dial tcp 172.31.22.227:2380: connect: connection refused"} Jan 30 13:56:49.716453 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:49.715Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"0s","error":"dial tcp 172.31.22.227:2380: connect: connection refused"} Jan 30 13:56:49.730111 systemd[1]: Started sshd@126-172.31.21.135:22-209.38.146.62:49596.service - OpenSSH per-connection server daemon (209.38.146.62:49596). Jan 30 13:56:49.837957 sshd[3860]: Invalid user user from 209.38.146.62 port 49596 Jan 30 13:56:49.859487 sshd[3860]: Connection closed by invalid user user 209.38.146.62 port 49596 [preauth] Jan 30 13:56:49.862261 systemd[1]: sshd@126-172.31.21.135:22-209.38.146.62:49596.service: Deactivated successfully. Jan 30 13:56:49.888209 systemd[1]: Started sshd@127-172.31.21.135:22-209.38.146.62:49610.service - OpenSSH per-connection server daemon (209.38.146.62:49610). Jan 30 13:56:50.026106 sshd[3865]: Invalid user user from 209.38.146.62 port 49610 Jan 30 13:56:50.047246 sshd[3865]: Connection closed by invalid user user 209.38.146.62 port 49610 [preauth] Jan 30 13:56:50.054621 systemd[1]: sshd@127-172.31.21.135:22-209.38.146.62:49610.service: Deactivated successfully. Jan 30 13:56:50.090970 systemd[1]: Started sshd@128-172.31.21.135:22-209.38.146.62:49620.service - OpenSSH per-connection server daemon (209.38.146.62:49620). Jan 30 13:56:50.220347 sshd[3870]: Invalid user user from 209.38.146.62 port 49620 Jan 30 13:56:50.241863 sshd[3870]: Connection closed by invalid user user 209.38.146.62 port 49620 [preauth] Jan 30 13:56:50.247585 systemd[1]: sshd@128-172.31.21.135:22-209.38.146.62:49620.service: Deactivated successfully. Jan 30 13:56:50.281792 systemd[1]: Started sshd@129-172.31.21.135:22-209.38.146.62:49630.service - OpenSSH per-connection server daemon (209.38.146.62:49630). Jan 30 13:56:50.418701 sshd[3875]: Invalid user user from 209.38.146.62 port 49630 Jan 30 13:56:50.439529 sshd[3875]: Connection closed by invalid user user 209.38.146.62 port 49630 [preauth] Jan 30 13:56:50.444063 systemd[1]: sshd@129-172.31.21.135:22-209.38.146.62:49630.service: Deactivated successfully. Jan 30 13:56:50.478922 systemd[1]: Started sshd@130-172.31.21.135:22-209.38.146.62:49644.service - OpenSSH per-connection server daemon (209.38.146.62:49644). Jan 30 13:56:50.586414 sshd[3886]: Invalid user user from 209.38.146.62 port 49644 Jan 30 13:56:50.607201 sshd[3886]: Connection closed by invalid user user 209.38.146.62 port 49644 [preauth] Jan 30 13:56:50.609613 systemd[1]: sshd@130-172.31.21.135:22-209.38.146.62:49644.service: Deactivated successfully. Jan 30 13:56:50.657101 systemd[1]: Started sshd@131-172.31.21.135:22-209.38.146.62:49654.service - OpenSSH per-connection server daemon (209.38.146.62:49654). Jan 30 13:56:50.772183 sshd[3891]: Invalid user user from 209.38.146.62 port 49654 Jan 30 13:56:50.793469 sshd[3891]: Connection closed by invalid user user 209.38.146.62 port 49654 [preauth] Jan 30 13:56:50.795999 systemd[1]: sshd@131-172.31.21.135:22-209.38.146.62:49654.service: Deactivated successfully. Jan 30 13:56:50.841082 systemd[1]: Started sshd@132-172.31.21.135:22-209.38.146.62:49662.service - OpenSSH per-connection server daemon (209.38.146.62:49662). Jan 30 13:56:50.944924 sshd[3896]: Invalid user user from 209.38.146.62 port 49662 Jan 30 13:56:50.973973 sshd[3896]: Connection closed by invalid user user 209.38.146.62 port 49662 [preauth] Jan 30 13:56:50.980868 systemd[1]: sshd@132-172.31.21.135:22-209.38.146.62:49662.service: Deactivated successfully. Jan 30 13:56:51.023097 systemd[1]: Started sshd@133-172.31.21.135:22-209.38.146.62:49666.service - OpenSSH per-connection server daemon (209.38.146.62:49666). Jan 30 13:56:51.126579 sshd[3901]: Invalid user user from 209.38.146.62 port 49666 Jan 30 13:56:51.148092 sshd[3901]: Connection closed by invalid user user 209.38.146.62 port 49666 [preauth] Jan 30 13:56:51.151810 systemd[1]: sshd@133-172.31.21.135:22-209.38.146.62:49666.service: Deactivated successfully. Jan 30 13:56:51.179879 systemd[1]: Started sshd@134-172.31.21.135:22-209.38.146.62:49682.service - OpenSSH per-connection server daemon (209.38.146.62:49682). Jan 30 13:56:51.299939 sshd[3906]: Invalid user user from 209.38.146.62 port 49682 Jan 30 13:56:51.321047 sshd[3906]: Connection closed by invalid user user 209.38.146.62 port 49682 [preauth] Jan 30 13:56:51.323579 systemd[1]: sshd@134-172.31.21.135:22-209.38.146.62:49682.service: Deactivated successfully. Jan 30 13:56:51.364232 systemd[1]: Started sshd@135-172.31.21.135:22-209.38.146.62:49696.service - OpenSSH per-connection server daemon (209.38.146.62:49696). Jan 30 13:56:51.381257 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:51.378Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:51.381257 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:51.379Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:51.481918 sshd[3911]: Invalid user user from 209.38.146.62 port 49696 Jan 30 13:56:51.502846 sshd[3911]: Connection closed by invalid user user 209.38.146.62 port 49696 [preauth] Jan 30 13:56:51.505251 systemd[1]: sshd@135-172.31.21.135:22-209.38.146.62:49696.service: Deactivated successfully. Jan 30 13:56:51.541414 systemd[1]: Started sshd@136-172.31.21.135:22-209.38.146.62:49702.service - OpenSSH per-connection server daemon (209.38.146.62:49702). Jan 30 13:56:51.644301 sshd[3916]: Invalid user user from 209.38.146.62 port 49702 Jan 30 13:56:51.669381 sshd[3916]: Connection closed by invalid user user 209.38.146.62 port 49702 [preauth] Jan 30 13:56:51.673992 systemd[1]: sshd@136-172.31.21.135:22-209.38.146.62:49702.service: Deactivated successfully. Jan 30 13:56:51.700495 systemd[1]: Started sshd@137-172.31.21.135:22-209.38.146.62:49704.service - OpenSSH per-connection server daemon (209.38.146.62:49704). Jan 30 13:56:51.818857 sshd[3921]: Invalid user user from 209.38.146.62 port 49704 Jan 30 13:56:51.839982 sshd[3921]: Connection closed by invalid user user 209.38.146.62 port 49704 [preauth] Jan 30 13:56:51.842445 systemd[1]: sshd@137-172.31.21.135:22-209.38.146.62:49704.service: Deactivated successfully. Jan 30 13:56:51.877128 systemd[1]: Started sshd@138-172.31.21.135:22-209.38.146.62:49716.service - OpenSSH per-connection server daemon (209.38.146.62:49716). Jan 30 13:56:52.005930 sshd[3926]: Invalid user user from 209.38.146.62 port 49716 Jan 30 13:56:52.026564 sshd[3926]: Connection closed by invalid user user 209.38.146.62 port 49716 [preauth] Jan 30 13:56:52.029434 systemd[1]: sshd@138-172.31.21.135:22-209.38.146.62:49716.service: Deactivated successfully. Jan 30 13:56:52.076206 systemd[1]: Started sshd@139-172.31.21.135:22-209.38.146.62:49728.service - OpenSSH per-connection server daemon (209.38.146.62:49728). Jan 30 13:56:52.201035 sshd[3931]: Invalid user user from 209.38.146.62 port 49728 Jan 30 13:56:52.222991 sshd[3931]: Connection closed by invalid user user 209.38.146.62 port 49728 [preauth] Jan 30 13:56:52.225420 systemd[1]: sshd@139-172.31.21.135:22-209.38.146.62:49728.service: Deactivated successfully. Jan 30 13:56:52.279214 systemd[1]: Started sshd@140-172.31.21.135:22-209.38.146.62:49742.service - OpenSSH per-connection server daemon (209.38.146.62:49742). Jan 30 13:56:52.422170 sshd[3936]: Invalid user user from 209.38.146.62 port 49742 Jan 30 13:56:52.442739 sshd[3936]: Connection closed by invalid user user 209.38.146.62 port 49742 [preauth] Jan 30 13:56:52.445352 systemd[1]: sshd@140-172.31.21.135:22-209.38.146.62:49742.service: Deactivated successfully. Jan 30 13:56:52.481122 systemd[1]: Started sshd@141-172.31.21.135:22-209.38.146.62:49744.service - OpenSSH per-connection server daemon (209.38.146.62:49744). Jan 30 13:56:52.582567 sshd[3941]: Invalid user user from 209.38.146.62 port 49744 Jan 30 13:56:52.604040 sshd[3941]: Connection closed by invalid user user 209.38.146.62 port 49744 [preauth] Jan 30 13:56:52.606734 systemd[1]: sshd@141-172.31.21.135:22-209.38.146.62:49744.service: Deactivated successfully. Jan 30 13:56:52.643212 systemd[1]: Started sshd@142-172.31.21.135:22-209.38.146.62:49760.service - OpenSSH per-connection server daemon (209.38.146.62:49760). Jan 30 13:56:52.761532 sshd[3946]: Invalid user user from 209.38.146.62 port 49760 Jan 30 13:56:52.782150 sshd[3946]: Connection closed by invalid user user 209.38.146.62 port 49760 [preauth] Jan 30 13:56:52.784013 systemd[1]: sshd@142-172.31.21.135:22-209.38.146.62:49760.service: Deactivated successfully. Jan 30 13:56:52.815070 systemd[1]: Started sshd@143-172.31.21.135:22-209.38.146.62:49768.service - OpenSSH per-connection server daemon (209.38.146.62:49768). Jan 30 13:56:52.917126 sshd[3951]: Invalid user user from 209.38.146.62 port 49768 Jan 30 13:56:52.938569 sshd[3951]: Connection closed by invalid user user 209.38.146.62 port 49768 [preauth] Jan 30 13:56:52.941425 systemd[1]: sshd@143-172.31.21.135:22-209.38.146.62:49768.service: Deactivated successfully. Jan 30 13:56:52.973503 systemd[1]: Started sshd@144-172.31.21.135:22-209.38.146.62:49772.service - OpenSSH per-connection server daemon (209.38.146.62:49772). Jan 30 13:56:53.090603 sshd[3956]: Invalid user user from 209.38.146.62 port 49772 Jan 30 13:56:53.113665 sshd[3956]: Connection closed by invalid user user 209.38.146.62 port 49772 [preauth] Jan 30 13:56:53.116785 systemd[1]: sshd@144-172.31.21.135:22-209.38.146.62:49772.service: Deactivated successfully. Jan 30 13:56:53.154052 systemd[1]: Started sshd@145-172.31.21.135:22-209.38.146.62:49780.service - OpenSSH per-connection server daemon (209.38.146.62:49780). Jan 30 13:56:53.262603 sshd[3961]: Invalid user user from 209.38.146.62 port 49780 Jan 30 13:56:53.285396 sshd[3961]: Connection closed by invalid user user 209.38.146.62 port 49780 [preauth] Jan 30 13:56:53.287841 systemd[1]: sshd@145-172.31.21.135:22-209.38.146.62:49780.service: Deactivated successfully. Jan 30 13:56:53.321057 systemd[1]: Started sshd@146-172.31.21.135:22-209.38.146.62:49794.service - OpenSSH per-connection server daemon (209.38.146.62:49794). Jan 30 13:56:53.432483 sshd[3966]: Invalid user user from 209.38.146.62 port 49794 Jan 30 13:56:53.458308 sshd[3966]: Connection closed by invalid user user 209.38.146.62 port 49794 [preauth] Jan 30 13:56:53.461370 systemd[1]: sshd@146-172.31.21.135:22-209.38.146.62:49794.service: Deactivated successfully. Jan 30 13:56:53.502166 systemd[1]: Started sshd@147-172.31.21.135:22-209.38.146.62:49796.service - OpenSSH per-connection server daemon (209.38.146.62:49796). Jan 30 13:56:53.602208 sshd[3971]: Invalid user user from 209.38.146.62 port 49796 Jan 30 13:56:53.627374 sshd[3971]: Connection closed by invalid user user 209.38.146.62 port 49796 [preauth] Jan 30 13:56:53.630005 systemd[1]: sshd@147-172.31.21.135:22-209.38.146.62:49796.service: Deactivated successfully. Jan 30 13:56:53.667693 systemd[1]: Started sshd@148-172.31.21.135:22-209.38.146.62:49810.service - OpenSSH per-connection server daemon (209.38.146.62:49810). Jan 30 13:56:53.789965 sshd[3976]: Invalid user user from 209.38.146.62 port 49810 Jan 30 13:56:53.810891 sshd[3976]: Connection closed by invalid user user 209.38.146.62 port 49810 [preauth] Jan 30 13:56:53.817676 systemd[1]: sshd@148-172.31.21.135:22-209.38.146.62:49810.service: Deactivated successfully. Jan 30 13:56:53.849285 systemd[1]: Started sshd@149-172.31.21.135:22-209.38.146.62:49814.service - OpenSSH per-connection server daemon (209.38.146.62:49814). Jan 30 13:56:53.969976 sshd[3981]: Invalid user user from 209.38.146.62 port 49814 Jan 30 13:56:53.993229 sshd[3981]: Connection closed by invalid user user 209.38.146.62 port 49814 [preauth] Jan 30 13:56:53.995404 systemd[1]: sshd@149-172.31.21.135:22-209.38.146.62:49814.service: Deactivated successfully. Jan 30 13:56:54.035999 systemd[1]: Started sshd@150-172.31.21.135:22-209.38.146.62:49818.service - OpenSSH per-connection server daemon (209.38.146.62:49818). Jan 30 13:56:54.176602 sshd[3986]: Invalid user user from 209.38.146.62 port 49818 Jan 30 13:56:54.197119 sshd[3986]: Connection closed by invalid user user 209.38.146.62 port 49818 [preauth] Jan 30 13:56:54.199717 systemd[1]: sshd@150-172.31.21.135:22-209.38.146.62:49818.service: Deactivated successfully. Jan 30 13:56:54.235410 systemd[1]: Started sshd@151-172.31.21.135:22-209.38.146.62:49830.service - OpenSSH per-connection server daemon (209.38.146.62:49830). Jan 30 13:56:54.351613 sshd[3991]: Invalid user user from 209.38.146.62 port 49830 Jan 30 13:56:54.372676 sshd[3991]: Connection closed by invalid user user 209.38.146.62 port 49830 [preauth] Jan 30 13:56:54.375988 systemd[1]: sshd@151-172.31.21.135:22-209.38.146.62:49830.service: Deactivated successfully. Jan 30 13:56:54.410498 systemd[1]: Started sshd@152-172.31.21.135:22-209.38.146.62:49836.service - OpenSSH per-connection server daemon (209.38.146.62:49836). Jan 30 13:56:54.534939 sshd[3996]: Invalid user user from 209.38.146.62 port 49836 Jan 30 13:56:54.556405 sshd[3996]: Connection closed by invalid user user 209.38.146.62 port 49836 [preauth] Jan 30 13:56:54.559350 systemd[1]: sshd@152-172.31.21.135:22-209.38.146.62:49836.service: Deactivated successfully. Jan 30 13:56:54.601014 systemd[1]: Started sshd@153-172.31.21.135:22-209.38.146.62:49848.service - OpenSSH per-connection server daemon (209.38.146.62:49848). Jan 30 13:56:54.715309 sshd[4001]: Invalid user user from 209.38.146.62 port 49848 Jan 30 13:56:54.716107 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:54.715Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"0s","error":"dial tcp 172.31.22.227:2380: connect: connection refused"} Jan 30 13:56:54.716825 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:54.715Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"0s","error":"dial tcp 172.31.22.227:2380: connect: connection refused"} Jan 30 13:56:54.736870 sshd[4001]: Connection closed by invalid user user 209.38.146.62 port 49848 [preauth] Jan 30 13:56:54.739539 systemd[1]: sshd@153-172.31.21.135:22-209.38.146.62:49848.service: Deactivated successfully. Jan 30 13:56:54.774743 systemd[1]: Started sshd@154-172.31.21.135:22-209.38.146.62:49860.service - OpenSSH per-connection server daemon (209.38.146.62:49860). Jan 30 13:56:54.916335 sshd[4006]: Invalid user user from 209.38.146.62 port 49860 Jan 30 13:56:54.939224 sshd[4006]: Connection closed by invalid user user 209.38.146.62 port 49860 [preauth] Jan 30 13:56:54.942238 systemd[1]: sshd@154-172.31.21.135:22-209.38.146.62:49860.service: Deactivated successfully. Jan 30 13:56:54.973247 systemd[1]: Started sshd@155-172.31.21.135:22-209.38.146.62:49874.service - OpenSSH per-connection server daemon (209.38.146.62:49874). Jan 30 13:56:55.110675 sshd[4011]: Invalid user user from 209.38.146.62 port 49874 Jan 30 13:56:55.131711 sshd[4011]: Connection closed by invalid user user 209.38.146.62 port 49874 [preauth] Jan 30 13:56:55.134174 systemd[1]: sshd@155-172.31.21.135:22-209.38.146.62:49874.service: Deactivated successfully. Jan 30 13:56:55.166120 systemd[1]: Started sshd@156-172.31.21.135:22-209.38.146.62:49890.service - OpenSSH per-connection server daemon (209.38.146.62:49890). Jan 30 13:56:55.281941 sshd[4016]: Invalid user user from 209.38.146.62 port 49890 Jan 30 13:56:55.302484 sshd[4016]: Connection closed by invalid user user 209.38.146.62 port 49890 [preauth] Jan 30 13:56:55.313148 systemd[1]: sshd@156-172.31.21.135:22-209.38.146.62:49890.service: Deactivated successfully. Jan 30 13:56:55.354128 systemd[1]: Started sshd@157-172.31.21.135:22-209.38.146.62:49898.service - OpenSSH per-connection server daemon (209.38.146.62:49898). Jan 30 13:56:55.452473 sshd[4027]: Invalid user user from 209.38.146.62 port 49898 Jan 30 13:56:55.474501 sshd[4027]: Connection closed by invalid user user 209.38.146.62 port 49898 [preauth] Jan 30 13:56:55.479162 systemd[1]: sshd@157-172.31.21.135:22-209.38.146.62:49898.service: Deactivated successfully. Jan 30 13:56:55.505452 systemd[1]: Started sshd@158-172.31.21.135:22-209.38.146.62:49902.service - OpenSSH per-connection server daemon (209.38.146.62:49902). Jan 30 13:56:55.626050 sshd[4032]: Invalid user user from 209.38.146.62 port 49902 Jan 30 13:56:55.646920 sshd[4032]: Connection closed by invalid user user 209.38.146.62 port 49902 [preauth] Jan 30 13:56:55.649429 systemd[1]: sshd@158-172.31.21.135:22-209.38.146.62:49902.service: Deactivated successfully. Jan 30 13:56:55.680300 systemd[1]: Started sshd@159-172.31.21.135:22-209.38.146.62:49916.service - OpenSSH per-connection server daemon (209.38.146.62:49916). Jan 30 13:56:55.792075 sshd[4037]: Invalid user user from 209.38.146.62 port 49916 Jan 30 13:56:55.813183 sshd[4037]: Connection closed by invalid user user 209.38.146.62 port 49916 [preauth] Jan 30 13:56:55.816335 systemd[1]: sshd@159-172.31.21.135:22-209.38.146.62:49916.service: Deactivated successfully. Jan 30 13:56:55.851104 systemd[1]: Started sshd@160-172.31.21.135:22-209.38.146.62:49922.service - OpenSSH per-connection server daemon (209.38.146.62:49922). Jan 30 13:56:55.973377 sshd[4042]: Invalid user user from 209.38.146.62 port 49922 Jan 30 13:56:55.993971 sshd[4042]: Connection closed by invalid user user 209.38.146.62 port 49922 [preauth] Jan 30 13:56:55.996618 systemd[1]: sshd@160-172.31.21.135:22-209.38.146.62:49922.service: Deactivated successfully. Jan 30 13:56:56.028072 systemd[1]: Started sshd@161-172.31.21.135:22-209.38.146.62:49938.service - OpenSSH per-connection server daemon (209.38.146.62:49938). Jan 30 13:56:56.150020 sshd[4047]: Invalid user user from 209.38.146.62 port 49938 Jan 30 13:56:56.170945 sshd[4047]: Connection closed by invalid user user 209.38.146.62 port 49938 [preauth] Jan 30 13:56:56.173732 systemd[1]: sshd@161-172.31.21.135:22-209.38.146.62:49938.service: Deactivated successfully. Jan 30 13:56:56.208242 systemd[1]: Started sshd@162-172.31.21.135:22-209.38.146.62:49954.service - OpenSSH per-connection server daemon (209.38.146.62:49954). Jan 30 13:56:56.335119 sshd[4052]: Invalid user user from 209.38.146.62 port 49954 Jan 30 13:56:56.356059 sshd[4052]: Connection closed by invalid user user 209.38.146.62 port 49954 [preauth] Jan 30 13:56:56.358475 systemd[1]: sshd@162-172.31.21.135:22-209.38.146.62:49954.service: Deactivated successfully. Jan 30 13:56:56.392103 systemd[1]: Started sshd@163-172.31.21.135:22-209.38.146.62:49960.service - OpenSSH per-connection server daemon (209.38.146.62:49960). Jan 30 13:56:56.499744 sshd[4057]: Invalid user user from 209.38.146.62 port 49960 Jan 30 13:56:56.520443 sshd[4057]: Connection closed by invalid user user 209.38.146.62 port 49960 [preauth] Jan 30 13:56:56.524264 systemd[1]: sshd@163-172.31.21.135:22-209.38.146.62:49960.service: Deactivated successfully. Jan 30 13:56:56.563156 systemd[1]: Started sshd@164-172.31.21.135:22-209.38.146.62:49970.service - OpenSSH per-connection server daemon (209.38.146.62:49970). Jan 30 13:56:56.673506 sshd[4062]: Invalid user user from 209.38.146.62 port 49970 Jan 30 13:56:56.695306 sshd[4062]: Connection closed by invalid user user 209.38.146.62 port 49970 [preauth] Jan 30 13:56:56.698884 systemd[1]: sshd@164-172.31.21.135:22-209.38.146.62:49970.service: Deactivated successfully. Jan 30 13:56:56.740113 systemd[1]: Started sshd@165-172.31.21.135:22-209.38.146.62:49972.service - OpenSSH per-connection server daemon (209.38.146.62:49972). Jan 30 13:56:56.885323 sshd[4067]: Invalid user user from 209.38.146.62 port 49972 Jan 30 13:56:56.906084 sshd[4067]: Connection closed by invalid user user 209.38.146.62 port 49972 [preauth] Jan 30 13:56:56.908517 systemd[1]: sshd@165-172.31.21.135:22-209.38.146.62:49972.service: Deactivated successfully. Jan 30 13:56:56.943068 systemd[1]: Started sshd@166-172.31.21.135:22-209.38.146.62:49984.service - OpenSSH per-connection server daemon (209.38.146.62:49984). Jan 30 13:56:57.077599 sshd[4072]: Invalid user user from 209.38.146.62 port 49984 Jan 30 13:56:57.098468 sshd[4072]: Connection closed by invalid user user 209.38.146.62 port 49984 [preauth] Jan 30 13:56:57.102451 systemd[1]: sshd@166-172.31.21.135:22-209.38.146.62:49984.service: Deactivated successfully. Jan 30 13:56:57.144424 systemd[1]: Started sshd@167-172.31.21.135:22-209.38.146.62:45224.service - OpenSSH per-connection server daemon (209.38.146.62:45224). Jan 30 13:56:57.297816 sshd[4077]: Invalid user user from 209.38.146.62 port 45224 Jan 30 13:56:57.318927 sshd[4077]: Connection closed by invalid user user 209.38.146.62 port 45224 [preauth] Jan 30 13:56:57.321404 systemd[1]: sshd@167-172.31.21.135:22-209.38.146.62:45224.service: Deactivated successfully. Jan 30 13:56:57.368540 systemd[1]: Started sshd@168-172.31.21.135:22-209.38.146.62:45234.service - OpenSSH per-connection server daemon (209.38.146.62:45234). Jan 30 13:56:57.486981 sshd[4082]: Invalid user user from 209.38.146.62 port 45234 Jan 30 13:56:57.507805 sshd[4082]: Connection closed by invalid user user 209.38.146.62 port 45234 [preauth] Jan 30 13:56:57.512013 systemd[1]: sshd@168-172.31.21.135:22-209.38.146.62:45234.service: Deactivated successfully. Jan 30 13:56:57.541349 systemd[1]: Started sshd@169-172.31.21.135:22-209.38.146.62:45242.service - OpenSSH per-connection server daemon (209.38.146.62:45242). Jan 30 13:56:57.657791 sshd[4087]: Invalid user user from 209.38.146.62 port 45242 Jan 30 13:56:57.679968 sshd[4087]: Connection closed by invalid user user 209.38.146.62 port 45242 [preauth] Jan 30 13:56:57.682614 systemd[1]: sshd@169-172.31.21.135:22-209.38.146.62:45242.service: Deactivated successfully. Jan 30 13:56:57.714150 systemd[1]: Started sshd@170-172.31.21.135:22-209.38.146.62:45250.service - OpenSSH per-connection server daemon (209.38.146.62:45250). Jan 30 13:56:57.824624 sshd[4092]: Invalid user user from 209.38.146.62 port 45250 Jan 30 13:56:57.845426 sshd[4092]: Connection closed by invalid user user 209.38.146.62 port 45250 [preauth] Jan 30 13:56:57.848411 systemd[1]: sshd@170-172.31.21.135:22-209.38.146.62:45250.service: Deactivated successfully. Jan 30 13:56:57.890120 systemd[1]: Started sshd@171-172.31.21.135:22-209.38.146.62:45256.service - OpenSSH per-connection server daemon (209.38.146.62:45256). Jan 30 13:56:58.008579 sshd[4097]: Invalid user user from 209.38.146.62 port 45256 Jan 30 13:56:58.029886 sshd[4097]: Connection closed by invalid user user 209.38.146.62 port 45256 [preauth] Jan 30 13:56:58.034063 systemd[1]: sshd@171-172.31.21.135:22-209.38.146.62:45256.service: Deactivated successfully. Jan 30 13:56:58.064360 systemd[1]: Started sshd@172-172.31.21.135:22-209.38.146.62:45266.service - OpenSSH per-connection server daemon (209.38.146.62:45266). Jan 30 13:56:58.184886 sshd[4102]: Invalid user user from 209.38.146.62 port 45266 Jan 30 13:56:58.209524 sshd[4102]: Connection closed by invalid user user 209.38.146.62 port 45266 [preauth] Jan 30 13:56:58.213232 systemd[1]: sshd@172-172.31.21.135:22-209.38.146.62:45266.service: Deactivated successfully. Jan 30 13:56:58.244173 systemd[1]: Started sshd@173-172.31.21.135:22-209.38.146.62:45276.service - OpenSSH per-connection server daemon (209.38.146.62:45276). Jan 30 13:56:58.362620 sshd[4107]: Invalid user user from 209.38.146.62 port 45276 Jan 30 13:56:58.384282 sshd[4107]: Connection closed by invalid user user 209.38.146.62 port 45276 [preauth] Jan 30 13:56:58.386537 systemd[1]: sshd@173-172.31.21.135:22-209.38.146.62:45276.service: Deactivated successfully. Jan 30 13:56:58.420013 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:58.419Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"b1da9f7a3bcbf26a","stream-type":"stream Message"} Jan 30 13:56:58.420013 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:58.419Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:58.420013 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:58.419Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:58.420013 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:58.419Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"8afdd45dfef98e56","to":"b1da9f7a3bcbf26a","stream-type":"stream MsgApp v2"} Jan 30 13:56:58.420013 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:58.419Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:58.425311 systemd[1]: Started sshd@174-172.31.21.135:22-209.38.146.62:45290.service - OpenSSH per-connection server daemon (209.38.146.62:45290). Jan 30 13:56:58.469546 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:58.469Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:58.485528 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:56:58.485Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:56:58.530548 sshd[4112]: Invalid user user from 209.38.146.62 port 45290 Jan 30 13:56:58.551534 sshd[4112]: Connection closed by invalid user user 209.38.146.62 port 45290 [preauth] Jan 30 13:56:58.554174 systemd[1]: sshd@174-172.31.21.135:22-209.38.146.62:45290.service: Deactivated successfully. Jan 30 13:56:58.585144 systemd[1]: Started sshd@175-172.31.21.135:22-209.38.146.62:45300.service - OpenSSH per-connection server daemon (209.38.146.62:45300). Jan 30 13:56:58.693231 sshd[4117]: Invalid user user from 209.38.146.62 port 45300 Jan 30 13:56:58.716054 sshd[4117]: Connection closed by invalid user user 209.38.146.62 port 45300 [preauth] Jan 30 13:56:58.721777 systemd[1]: sshd@175-172.31.21.135:22-209.38.146.62:45300.service: Deactivated successfully. Jan 30 13:56:58.752276 systemd[1]: Started sshd@176-172.31.21.135:22-209.38.146.62:45302.service - OpenSSH per-connection server daemon (209.38.146.62:45302). Jan 30 13:56:58.797852 flannel-wrapper[3534]: I0130 13:56:58.797557 1 udp_network_amd64.go:196] Subnet added: 10.254.20.0/24 Jan 30 13:56:58.862057 sshd[4122]: Invalid user user from 209.38.146.62 port 45302 Jan 30 13:56:58.882937 sshd[4122]: Connection closed by invalid user user 209.38.146.62 port 45302 [preauth] Jan 30 13:56:58.889912 systemd[1]: sshd@176-172.31.21.135:22-209.38.146.62:45302.service: Deactivated successfully. Jan 30 13:56:58.929299 systemd[1]: Started sshd@177-172.31.21.135:22-209.38.146.62:45312.service - OpenSSH per-connection server daemon (209.38.146.62:45312). Jan 30 13:56:59.048369 sshd[4127]: Invalid user user from 209.38.146.62 port 45312 Jan 30 13:56:59.070080 sshd[4127]: Connection closed by invalid user user 209.38.146.62 port 45312 [preauth] Jan 30 13:56:59.074816 systemd[1]: sshd@177-172.31.21.135:22-209.38.146.62:45312.service: Deactivated successfully. Jan 30 13:56:59.107163 systemd[1]: Started sshd@178-172.31.21.135:22-209.38.146.62:45324.service - OpenSSH per-connection server daemon (209.38.146.62:45324). Jan 30 13:56:59.221929 sshd[4132]: Invalid user user from 209.38.146.62 port 45324 Jan 30 13:56:59.242454 sshd[4132]: Connection closed by invalid user user 209.38.146.62 port 45324 [preauth] Jan 30 13:56:59.245440 systemd[1]: sshd@178-172.31.21.135:22-209.38.146.62:45324.service: Deactivated successfully. Jan 30 13:56:59.295294 systemd[1]: Started sshd@179-172.31.21.135:22-209.38.146.62:45336.service - OpenSSH per-connection server daemon (209.38.146.62:45336). Jan 30 13:56:59.421814 sshd[4137]: Invalid user user from 209.38.146.62 port 45336 Jan 30 13:56:59.442706 sshd[4137]: Connection closed by invalid user user 209.38.146.62 port 45336 [preauth] Jan 30 13:56:59.446177 systemd[1]: sshd@179-172.31.21.135:22-209.38.146.62:45336.service: Deactivated successfully. Jan 30 13:56:59.478087 systemd[1]: Started sshd@180-172.31.21.135:22-209.38.146.62:45346.service - OpenSSH per-connection server daemon (209.38.146.62:45346). Jan 30 13:56:59.589188 sshd[4142]: Invalid user user from 209.38.146.62 port 45346 Jan 30 13:56:59.611812 sshd[4142]: Connection closed by invalid user user 209.38.146.62 port 45346 [preauth] Jan 30 13:56:59.618645 systemd[1]: sshd@180-172.31.21.135:22-209.38.146.62:45346.service: Deactivated successfully. Jan 30 13:56:59.662113 systemd[1]: Started sshd@181-172.31.21.135:22-209.38.146.62:45356.service - OpenSSH per-connection server daemon (209.38.146.62:45356). Jan 30 13:56:59.722015 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:59.718Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"0s","error":"dial tcp 172.31.22.227:2380: connect: connection refused"} Jan 30 13:56:59.722015 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:56:59.718Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"0s","error":"dial tcp 172.31.22.227:2380: connect: connection refused"} Jan 30 13:56:59.765319 sshd[4147]: Invalid user user from 209.38.146.62 port 45356 Jan 30 13:56:59.786287 sshd[4147]: Connection closed by invalid user user 209.38.146.62 port 45356 [preauth] Jan 30 13:56:59.790122 systemd[1]: sshd@181-172.31.21.135:22-209.38.146.62:45356.service: Deactivated successfully. Jan 30 13:56:59.821881 systemd[1]: Started sshd@182-172.31.21.135:22-209.38.146.62:45358.service - OpenSSH per-connection server daemon (209.38.146.62:45358). Jan 30 13:56:59.948052 sshd[4152]: Invalid user user from 209.38.146.62 port 45358 Jan 30 13:56:59.969630 sshd[4152]: Connection closed by invalid user user 209.38.146.62 port 45358 [preauth] Jan 30 13:56:59.973418 systemd[1]: sshd@182-172.31.21.135:22-209.38.146.62:45358.service: Deactivated successfully. Jan 30 13:57:00.035428 systemd[1]: Started sshd@183-172.31.21.135:22-209.38.146.62:45370.service - OpenSSH per-connection server daemon (209.38.146.62:45370). Jan 30 13:57:00.255507 sshd[4157]: Invalid user user from 209.38.146.62 port 45370 Jan 30 13:57:00.276049 sshd[4157]: Connection closed by invalid user user 209.38.146.62 port 45370 [preauth] Jan 30 13:57:00.279582 systemd[1]: sshd@183-172.31.21.135:22-209.38.146.62:45370.service: Deactivated successfully. Jan 30 13:57:00.319157 systemd[1]: Started sshd@184-172.31.21.135:22-209.38.146.62:45372.service - OpenSSH per-connection server daemon (209.38.146.62:45372). Jan 30 13:57:00.466613 sshd[4162]: Invalid user user from 209.38.146.62 port 45372 Jan 30 13:57:00.488097 sshd[4162]: Connection closed by invalid user user 209.38.146.62 port 45372 [preauth] Jan 30 13:57:00.492351 systemd[1]: sshd@184-172.31.21.135:22-209.38.146.62:45372.service: Deactivated successfully. Jan 30 13:57:00.522129 systemd[1]: Started sshd@185-172.31.21.135:22-209.38.146.62:45384.service - OpenSSH per-connection server daemon (209.38.146.62:45384). Jan 30 13:57:00.634612 sshd[4173]: Invalid user user from 209.38.146.62 port 45384 Jan 30 13:57:00.655091 sshd[4173]: Connection closed by invalid user user 209.38.146.62 port 45384 [preauth] Jan 30 13:57:00.657555 systemd[1]: sshd@185-172.31.21.135:22-209.38.146.62:45384.service: Deactivated successfully. Jan 30 13:57:00.690048 systemd[1]: Started sshd@186-172.31.21.135:22-209.38.146.62:45400.service - OpenSSH per-connection server daemon (209.38.146.62:45400). Jan 30 13:57:00.806920 sshd[4178]: Invalid user ubuntu from 209.38.146.62 port 45400 Jan 30 13:57:00.827214 sshd[4178]: Connection closed by invalid user ubuntu 209.38.146.62 port 45400 [preauth] Jan 30 13:57:00.829954 systemd[1]: sshd@186-172.31.21.135:22-209.38.146.62:45400.service: Deactivated successfully. Jan 30 13:57:00.871266 systemd[1]: Started sshd@187-172.31.21.135:22-209.38.146.62:45404.service - OpenSSH per-connection server daemon (209.38.146.62:45404). Jan 30 13:57:00.984751 sshd[4183]: Invalid user ubuntu from 209.38.146.62 port 45404 Jan 30 13:57:01.005562 sshd[4183]: Connection closed by invalid user ubuntu 209.38.146.62 port 45404 [preauth] Jan 30 13:57:01.008355 systemd[1]: sshd@187-172.31.21.135:22-209.38.146.62:45404.service: Deactivated successfully. Jan 30 13:57:01.051202 systemd[1]: Started sshd@188-172.31.21.135:22-209.38.146.62:45420.service - OpenSSH per-connection server daemon (209.38.146.62:45420). Jan 30 13:57:01.174422 sshd[4188]: Invalid user ubuntu from 209.38.146.62 port 45420 Jan 30 13:57:01.195547 sshd[4188]: Connection closed by invalid user ubuntu 209.38.146.62 port 45420 [preauth] Jan 30 13:57:01.198291 systemd[1]: sshd@188-172.31.21.135:22-209.38.146.62:45420.service: Deactivated successfully. Jan 30 13:57:01.234124 systemd[1]: Started sshd@189-172.31.21.135:22-209.38.146.62:45424.service - OpenSSH per-connection server daemon (209.38.146.62:45424). Jan 30 13:57:01.355398 sshd[4193]: Invalid user ubuntu from 209.38.146.62 port 45424 Jan 30 13:57:01.375894 sshd[4193]: Connection closed by invalid user ubuntu 209.38.146.62 port 45424 [preauth] Jan 30 13:57:01.379571 systemd[1]: sshd@189-172.31.21.135:22-209.38.146.62:45424.service: Deactivated successfully. Jan 30 13:57:01.417887 systemd[1]: Started sshd@190-172.31.21.135:22-209.38.146.62:45438.service - OpenSSH per-connection server daemon (209.38.146.62:45438). Jan 30 13:57:01.550535 sshd[4198]: Invalid user ubuntu from 209.38.146.62 port 45438 Jan 30 13:57:01.579261 sshd[4198]: Connection closed by invalid user ubuntu 209.38.146.62 port 45438 [preauth] Jan 30 13:57:01.583424 systemd[1]: sshd@190-172.31.21.135:22-209.38.146.62:45438.service: Deactivated successfully. Jan 30 13:57:01.639539 systemd[1]: Started sshd@191-172.31.21.135:22-209.38.146.62:45450.service - OpenSSH per-connection server daemon (209.38.146.62:45450). Jan 30 13:57:01.791389 sshd[4203]: Invalid user ubuntu from 209.38.146.62 port 45450 Jan 30 13:57:01.812561 sshd[4203]: Connection closed by invalid user ubuntu 209.38.146.62 port 45450 [preauth] Jan 30 13:57:01.817649 systemd[1]: sshd@191-172.31.21.135:22-209.38.146.62:45450.service: Deactivated successfully. Jan 30 13:57:01.866139 systemd[1]: Started sshd@192-172.31.21.135:22-209.38.146.62:45464.service - OpenSSH per-connection server daemon (209.38.146.62:45464). Jan 30 13:57:02.000839 sshd[4208]: Invalid user ubuntu from 209.38.146.62 port 45464 Jan 30 13:57:02.024455 sshd[4208]: Connection closed by invalid user ubuntu 209.38.146.62 port 45464 [preauth] Jan 30 13:57:02.027331 systemd[1]: sshd@192-172.31.21.135:22-209.38.146.62:45464.service: Deactivated successfully. Jan 30 13:57:02.068142 systemd[1]: Started sshd@193-172.31.21.135:22-209.38.146.62:45466.service - OpenSSH per-connection server daemon (209.38.146.62:45466). Jan 30 13:57:02.232317 sshd[4213]: Invalid user ubuntu from 209.38.146.62 port 45466 Jan 30 13:57:02.253057 sshd[4213]: Connection closed by invalid user ubuntu 209.38.146.62 port 45466 [preauth] Jan 30 13:57:02.257396 systemd[1]: sshd@193-172.31.21.135:22-209.38.146.62:45466.service: Deactivated successfully. Jan 30 13:57:02.300374 systemd[1]: Started sshd@194-172.31.21.135:22-209.38.146.62:45476.service - OpenSSH per-connection server daemon (209.38.146.62:45476). Jan 30 13:57:02.502418 sshd[4218]: Invalid user ubuntu from 209.38.146.62 port 45476 Jan 30 13:57:02.524427 sshd[4218]: Connection closed by invalid user ubuntu 209.38.146.62 port 45476 [preauth] Jan 30 13:57:02.526895 systemd[1]: sshd@194-172.31.21.135:22-209.38.146.62:45476.service: Deactivated successfully. Jan 30 13:57:02.569260 systemd[1]: Started sshd@195-172.31.21.135:22-209.38.146.62:45488.service - OpenSSH per-connection server daemon (209.38.146.62:45488). Jan 30 13:57:02.647975 update_engine[1879]: I20250130 13:57:02.647774 1879 update_attempter.cc:509] Updating boot flags... Jan 30 13:57:02.754329 sshd[4223]: Invalid user ubuntu from 209.38.146.62 port 45488 Jan 30 13:57:02.783568 sshd[4223]: Connection closed by invalid user ubuntu 209.38.146.62 port 45488 [preauth] Jan 30 13:57:02.787347 systemd[1]: sshd@195-172.31.21.135:22-209.38.146.62:45488.service: Deactivated successfully. Jan 30 13:57:02.787702 kernel: BTRFS warning: duplicate device /dev/nvme0n1p3 devid 1 generation 38 scanned by (udev-worker) (4239) Jan 30 13:57:02.837218 systemd[1]: Started sshd@196-172.31.21.135:22-209.38.146.62:45504.service - OpenSSH per-connection server daemon (209.38.146.62:45504). Jan 30 13:57:03.020078 sshd[4258]: Invalid user ubuntu from 209.38.146.62 port 45504 Jan 30 13:57:03.052463 sshd[4258]: Connection closed by invalid user ubuntu 209.38.146.62 port 45504 [preauth] Jan 30 13:57:03.053681 systemd[1]: sshd@196-172.31.21.135:22-209.38.146.62:45504.service: Deactivated successfully. Jan 30 13:57:03.083105 systemd[1]: Started sshd@197-172.31.21.135:22-209.38.146.62:45520.service - OpenSSH per-connection server daemon (209.38.146.62:45520). Jan 30 13:57:03.100169 kernel: BTRFS warning: duplicate device /dev/nvme0n1p3 devid 1 generation 38 scanned by (udev-worker) (4238) Jan 30 13:57:03.242969 sshd[4337]: Invalid user ubuntu from 209.38.146.62 port 45520 Jan 30 13:57:03.267615 sshd[4337]: Connection closed by invalid user ubuntu 209.38.146.62 port 45520 [preauth] Jan 30 13:57:03.284334 systemd[1]: sshd@197-172.31.21.135:22-209.38.146.62:45520.service: Deactivated successfully. Jan 30 13:57:03.379709 kernel: BTRFS warning: duplicate device /dev/nvme0n1p3 devid 1 generation 38 scanned by (udev-worker) (4238) Jan 30 13:57:03.383997 systemd[1]: Started sshd@198-172.31.21.135:22-209.38.146.62:45530.service - OpenSSH per-connection server daemon (209.38.146.62:45530). Jan 30 13:57:03.523986 sshd[4427]: Invalid user ubuntu from 209.38.146.62 port 45530 Jan 30 13:57:03.549310 sshd[4427]: Connection closed by invalid user ubuntu 209.38.146.62 port 45530 [preauth] Jan 30 13:57:03.554512 systemd[1]: sshd@198-172.31.21.135:22-209.38.146.62:45530.service: Deactivated successfully. Jan 30 13:57:03.633180 systemd[1]: Started sshd@199-172.31.21.135:22-209.38.146.62:45538.service - OpenSSH per-connection server daemon (209.38.146.62:45538). Jan 30 13:57:03.746957 sshd[4510]: Invalid user ubuntu from 209.38.146.62 port 45538 Jan 30 13:57:03.768406 sshd[4510]: Connection closed by invalid user ubuntu 209.38.146.62 port 45538 [preauth] Jan 30 13:57:03.771764 systemd[1]: sshd@199-172.31.21.135:22-209.38.146.62:45538.service: Deactivated successfully. Jan 30 13:57:03.805184 systemd[1]: Started sshd@200-172.31.21.135:22-209.38.146.62:45550.service - OpenSSH per-connection server daemon (209.38.146.62:45550). Jan 30 13:57:03.913243 sshd[4515]: Invalid user ubuntu from 209.38.146.62 port 45550 Jan 30 13:57:03.933757 sshd[4515]: Connection closed by invalid user ubuntu 209.38.146.62 port 45550 [preauth] Jan 30 13:57:03.936091 systemd[1]: sshd@200-172.31.21.135:22-209.38.146.62:45550.service: Deactivated successfully. Jan 30 13:57:03.969023 systemd[1]: Started sshd@201-172.31.21.135:22-209.38.146.62:45552.service - OpenSSH per-connection server daemon (209.38.146.62:45552). Jan 30 13:57:04.095925 sshd[4520]: Invalid user ubuntu from 209.38.146.62 port 45552 Jan 30 13:57:04.116749 sshd[4520]: Connection closed by invalid user ubuntu 209.38.146.62 port 45552 [preauth] Jan 30 13:57:04.119973 systemd[1]: sshd@201-172.31.21.135:22-209.38.146.62:45552.service: Deactivated successfully. Jan 30 13:57:04.160118 systemd[1]: Started sshd@202-172.31.21.135:22-209.38.146.62:45556.service - OpenSSH per-connection server daemon (209.38.146.62:45556). Jan 30 13:57:04.292720 sshd[4525]: Invalid user ubuntu from 209.38.146.62 port 45556 Jan 30 13:57:04.315336 sshd[4525]: Connection closed by invalid user ubuntu 209.38.146.62 port 45556 [preauth] Jan 30 13:57:04.322017 systemd[1]: sshd@202-172.31.21.135:22-209.38.146.62:45556.service: Deactivated successfully. Jan 30 13:57:04.356353 systemd[1]: Started sshd@203-172.31.21.135:22-209.38.146.62:45560.service - OpenSSH per-connection server daemon (209.38.146.62:45560). Jan 30 13:57:04.508304 sshd[4530]: Invalid user ubuntu from 209.38.146.62 port 45560 Jan 30 13:57:04.528910 sshd[4530]: Connection closed by invalid user ubuntu 209.38.146.62 port 45560 [preauth] Jan 30 13:57:04.531314 systemd[1]: sshd@203-172.31.21.135:22-209.38.146.62:45560.service: Deactivated successfully. Jan 30 13:57:04.579088 systemd[1]: Started sshd@204-172.31.21.135:22-209.38.146.62:45572.service - OpenSSH per-connection server daemon (209.38.146.62:45572). Jan 30 13:57:04.680928 sshd[4535]: Invalid user ubuntu from 209.38.146.62 port 45572 Jan 30 13:57:04.709926 sshd[4535]: Connection closed by invalid user ubuntu 209.38.146.62 port 45572 [preauth] Jan 30 13:57:04.716163 systemd[1]: sshd@204-172.31.21.135:22-209.38.146.62:45572.service: Deactivated successfully. Jan 30 13:57:04.745378 systemd[1]: Started sshd@205-172.31.21.135:22-209.38.146.62:45588.service - OpenSSH per-connection server daemon (209.38.146.62:45588). Jan 30 13:57:04.860460 sshd[4540]: Invalid user ubuntu from 209.38.146.62 port 45588 Jan 30 13:57:04.883436 sshd[4540]: Connection closed by invalid user ubuntu 209.38.146.62 port 45588 [preauth] Jan 30 13:57:04.888350 systemd[1]: sshd@205-172.31.21.135:22-209.38.146.62:45588.service: Deactivated successfully. Jan 30 13:57:04.918145 systemd[1]: Started sshd@206-172.31.21.135:22-209.38.146.62:45594.service - OpenSSH per-connection server daemon (209.38.146.62:45594). Jan 30 13:57:05.027398 sshd[4545]: Invalid user ubuntu from 209.38.146.62 port 45594 Jan 30 13:57:05.048727 sshd[4545]: Connection closed by invalid user ubuntu 209.38.146.62 port 45594 [preauth] Jan 30 13:57:05.051174 systemd[1]: sshd@206-172.31.21.135:22-209.38.146.62:45594.service: Deactivated successfully. Jan 30 13:57:05.079192 systemd[1]: Started sshd@207-172.31.21.135:22-209.38.146.62:45600.service - OpenSSH per-connection server daemon (209.38.146.62:45600). Jan 30 13:57:05.191604 sshd[4550]: Invalid user ubuntu from 209.38.146.62 port 45600 Jan 30 13:57:05.212265 sshd[4550]: Connection closed by invalid user ubuntu 209.38.146.62 port 45600 [preauth] Jan 30 13:57:05.216419 systemd[1]: sshd@207-172.31.21.135:22-209.38.146.62:45600.service: Deactivated successfully. Jan 30 13:57:05.252475 systemd[1]: Started sshd@208-172.31.21.135:22-209.38.146.62:45604.service - OpenSSH per-connection server daemon (209.38.146.62:45604). Jan 30 13:57:05.385574 sshd[4555]: Invalid user ubuntu from 209.38.146.62 port 45604 Jan 30 13:57:05.410966 sshd[4555]: Connection closed by invalid user ubuntu 209.38.146.62 port 45604 [preauth] Jan 30 13:57:05.414096 systemd[1]: sshd@208-172.31.21.135:22-209.38.146.62:45604.service: Deactivated successfully. Jan 30 13:57:05.461136 systemd[1]: Started sshd@209-172.31.21.135:22-209.38.146.62:45610.service - OpenSSH per-connection server daemon (209.38.146.62:45610). Jan 30 13:57:05.573578 sshd[4566]: Invalid user ubuntu from 209.38.146.62 port 45610 Jan 30 13:57:05.594887 sshd[4566]: Connection closed by invalid user ubuntu 209.38.146.62 port 45610 [preauth] Jan 30 13:57:05.597303 systemd[1]: sshd@209-172.31.21.135:22-209.38.146.62:45610.service: Deactivated successfully. Jan 30 13:57:05.634041 systemd[1]: Started sshd@210-172.31.21.135:22-209.38.146.62:45622.service - OpenSSH per-connection server daemon (209.38.146.62:45622). Jan 30 13:57:05.732237 sshd[4571]: Invalid user ubuntu from 209.38.146.62 port 45622 Jan 30 13:57:05.753827 sshd[4571]: Connection closed by invalid user ubuntu 209.38.146.62 port 45622 [preauth] Jan 30 13:57:05.757050 systemd[1]: sshd@210-172.31.21.135:22-209.38.146.62:45622.service: Deactivated successfully. Jan 30 13:57:05.788130 systemd[1]: Started sshd@211-172.31.21.135:22-209.38.146.62:45626.service - OpenSSH per-connection server daemon (209.38.146.62:45626). Jan 30 13:57:05.884890 sshd[4576]: Invalid user ubuntu from 209.38.146.62 port 45626 Jan 30 13:57:05.905358 sshd[4576]: Connection closed by invalid user ubuntu 209.38.146.62 port 45626 [preauth] Jan 30 13:57:05.907653 systemd[1]: sshd@211-172.31.21.135:22-209.38.146.62:45626.service: Deactivated successfully. Jan 30 13:57:05.941623 systemd[1]: Started sshd@212-172.31.21.135:22-209.38.146.62:45638.service - OpenSSH per-connection server daemon (209.38.146.62:45638). Jan 30 13:57:06.068419 sshd[4581]: Invalid user ubuntu from 209.38.146.62 port 45638 Jan 30 13:57:06.089329 sshd[4581]: Connection closed by invalid user ubuntu 209.38.146.62 port 45638 [preauth] Jan 30 13:57:06.091709 systemd[1]: sshd@212-172.31.21.135:22-209.38.146.62:45638.service: Deactivated successfully. Jan 30 13:57:06.120610 systemd[1]: Started sshd@213-172.31.21.135:22-209.38.146.62:45640.service - OpenSSH per-connection server daemon (209.38.146.62:45640). Jan 30 13:57:06.246342 sshd[4587]: Invalid user ubuntu from 209.38.146.62 port 45640 Jan 30 13:57:06.267479 sshd[4587]: Connection closed by invalid user ubuntu 209.38.146.62 port 45640 [preauth] Jan 30 13:57:06.270012 systemd[1]: sshd@213-172.31.21.135:22-209.38.146.62:45640.service: Deactivated successfully. Jan 30 13:57:06.303081 systemd[1]: Started sshd@214-172.31.21.135:22-209.38.146.62:45646.service - OpenSSH per-connection server daemon (209.38.146.62:45646). Jan 30 13:57:06.410988 sshd[4592]: Invalid user ubuntu from 209.38.146.62 port 45646 Jan 30 13:57:06.432338 sshd[4592]: Connection closed by invalid user ubuntu 209.38.146.62 port 45646 [preauth] Jan 30 13:57:06.434810 systemd[1]: sshd@214-172.31.21.135:22-209.38.146.62:45646.service: Deactivated successfully. Jan 30 13:57:06.466742 systemd[1]: Started sshd@215-172.31.21.135:22-209.38.146.62:45662.service - OpenSSH per-connection server daemon (209.38.146.62:45662). Jan 30 13:57:06.572766 sshd[4598]: Invalid user ubuntu from 209.38.146.62 port 45662 Jan 30 13:57:06.594237 sshd[4598]: Connection closed by invalid user ubuntu 209.38.146.62 port 45662 [preauth] Jan 30 13:57:06.596924 systemd[1]: sshd@215-172.31.21.135:22-209.38.146.62:45662.service: Deactivated successfully. Jan 30 13:57:06.629186 systemd[1]: Started sshd@216-172.31.21.135:22-209.38.146.62:45678.service - OpenSSH per-connection server daemon (209.38.146.62:45678). Jan 30 13:57:06.733720 sshd[4603]: Invalid user ubuntu from 209.38.146.62 port 45678 Jan 30 13:57:06.753557 sshd[4603]: Connection closed by invalid user ubuntu 209.38.146.62 port 45678 [preauth] Jan 30 13:57:06.756002 systemd[1]: sshd@216-172.31.21.135:22-209.38.146.62:45678.service: Deactivated successfully. Jan 30 13:57:06.789311 systemd[1]: Started sshd@217-172.31.21.135:22-209.38.146.62:45694.service - OpenSSH per-connection server daemon (209.38.146.62:45694). Jan 30 13:57:06.911439 sshd[4609]: Invalid user ubuntu from 209.38.146.62 port 45694 Jan 30 13:57:06.938137 sshd[4609]: Connection closed by invalid user ubuntu 209.38.146.62 port 45694 [preauth] Jan 30 13:57:06.940552 systemd[1]: sshd@217-172.31.21.135:22-209.38.146.62:45694.service: Deactivated successfully. Jan 30 13:57:06.972100 systemd[1]: Started sshd@218-172.31.21.135:22-209.38.146.62:45696.service - OpenSSH per-connection server daemon (209.38.146.62:45696). Jan 30 13:57:07.072419 sshd[4614]: Invalid user ubuntu from 209.38.146.62 port 45696 Jan 30 13:57:07.093181 sshd[4614]: Connection closed by invalid user ubuntu 209.38.146.62 port 45696 [preauth] Jan 30 13:57:07.095824 systemd[1]: sshd@218-172.31.21.135:22-209.38.146.62:45696.service: Deactivated successfully. Jan 30 13:57:07.128046 systemd[1]: Started sshd@219-172.31.21.135:22-209.38.146.62:52918.service - OpenSSH per-connection server daemon (209.38.146.62:52918). Jan 30 13:57:07.232366 sshd[4619]: Invalid user ubuntu from 209.38.146.62 port 52918 Jan 30 13:57:07.253516 sshd[4619]: Connection closed by invalid user ubuntu 209.38.146.62 port 52918 [preauth] Jan 30 13:57:07.256866 systemd[1]: sshd@219-172.31.21.135:22-209.38.146.62:52918.service: Deactivated successfully. Jan 30 13:57:07.292138 systemd[1]: Started sshd@220-172.31.21.135:22-209.38.146.62:52926.service - OpenSSH per-connection server daemon (209.38.146.62:52926). Jan 30 13:57:07.415182 sshd[4624]: Invalid user ubuntu from 209.38.146.62 port 52926 Jan 30 13:57:07.439208 sshd[4624]: Connection closed by invalid user ubuntu 209.38.146.62 port 52926 [preauth] Jan 30 13:57:07.444563 systemd[1]: sshd@220-172.31.21.135:22-209.38.146.62:52926.service: Deactivated successfully. Jan 30 13:57:07.486389 systemd[1]: Started sshd@221-172.31.21.135:22-209.38.146.62:52932.service - OpenSSH per-connection server daemon (209.38.146.62:52932). Jan 30 13:57:07.594014 sshd[4629]: Invalid user ubuntu from 209.38.146.62 port 52932 Jan 30 13:57:07.615455 sshd[4629]: Connection closed by invalid user ubuntu 209.38.146.62 port 52932 [preauth] Jan 30 13:57:07.617865 systemd[1]: sshd@221-172.31.21.135:22-209.38.146.62:52932.service: Deactivated successfully. Jan 30 13:57:07.654268 systemd[1]: Started sshd@222-172.31.21.135:22-209.38.146.62:52942.service - OpenSSH per-connection server daemon (209.38.146.62:52942). Jan 30 13:57:07.750730 sshd[4634]: Invalid user ubuntu from 209.38.146.62 port 52942 Jan 30 13:57:07.771378 sshd[4634]: Connection closed by invalid user ubuntu 209.38.146.62 port 52942 [preauth] Jan 30 13:57:07.773848 systemd[1]: sshd@222-172.31.21.135:22-209.38.146.62:52942.service: Deactivated successfully. Jan 30 13:57:07.813175 systemd[1]: Started sshd@223-172.31.21.135:22-209.38.146.62:52956.service - OpenSSH per-connection server daemon (209.38.146.62:52956). Jan 30 13:57:07.921907 sshd[4639]: Invalid user ubuntu from 209.38.146.62 port 52956 Jan 30 13:57:07.942970 sshd[4639]: Connection closed by invalid user ubuntu 209.38.146.62 port 52956 [preauth] Jan 30 13:57:07.945395 systemd[1]: sshd@223-172.31.21.135:22-209.38.146.62:52956.service: Deactivated successfully. Jan 30 13:57:07.982069 systemd[1]: Started sshd@224-172.31.21.135:22-209.38.146.62:52962.service - OpenSSH per-connection server daemon (209.38.146.62:52962). Jan 30 13:57:08.092739 sshd[4644]: Invalid user ubuntu from 209.38.146.62 port 52962 Jan 30 13:57:08.113473 sshd[4644]: Connection closed by invalid user ubuntu 209.38.146.62 port 52962 [preauth] Jan 30 13:57:08.116285 systemd[1]: sshd@224-172.31.21.135:22-209.38.146.62:52962.service: Deactivated successfully. Jan 30 13:57:08.163160 systemd[1]: Started sshd@225-172.31.21.135:22-209.38.146.62:52972.service - OpenSSH per-connection server daemon (209.38.146.62:52972). Jan 30 13:57:08.264389 sshd[4649]: Invalid user ubuntu from 209.38.146.62 port 52972 Jan 30 13:57:08.285599 sshd[4649]: Connection closed by invalid user ubuntu 209.38.146.62 port 52972 [preauth] Jan 30 13:57:08.288205 systemd[1]: sshd@225-172.31.21.135:22-209.38.146.62:52972.service: Deactivated successfully. Jan 30 13:57:08.329100 systemd[1]: Started sshd@226-172.31.21.135:22-209.38.146.62:52980.service - OpenSSH per-connection server daemon (209.38.146.62:52980). Jan 30 13:57:08.443136 sshd[4654]: Invalid user ubuntu from 209.38.146.62 port 52980 Jan 30 13:57:08.464331 sshd[4654]: Connection closed by invalid user ubuntu 209.38.146.62 port 52980 [preauth] Jan 30 13:57:08.466841 systemd[1]: sshd@226-172.31.21.135:22-209.38.146.62:52980.service: Deactivated successfully. Jan 30 13:57:08.499093 systemd[1]: Started sshd@227-172.31.21.135:22-209.38.146.62:52994.service - OpenSSH per-connection server daemon (209.38.146.62:52994). Jan 30 13:57:08.607930 sshd[4659]: Invalid user ubuntu from 209.38.146.62 port 52994 Jan 30 13:57:08.628455 sshd[4659]: Connection closed by invalid user ubuntu 209.38.146.62 port 52994 [preauth] Jan 30 13:57:08.632129 systemd[1]: sshd@227-172.31.21.135:22-209.38.146.62:52994.service: Deactivated successfully. Jan 30 13:57:08.676143 systemd[1]: Started sshd@228-172.31.21.135:22-209.38.146.62:52996.service - OpenSSH per-connection server daemon (209.38.146.62:52996). Jan 30 13:57:08.816823 sshd[4664]: Invalid user ubuntu from 209.38.146.62 port 52996 Jan 30 13:57:08.837917 sshd[4664]: Connection closed by invalid user ubuntu 209.38.146.62 port 52996 [preauth] Jan 30 13:57:08.842817 systemd[1]: sshd@228-172.31.21.135:22-209.38.146.62:52996.service: Deactivated successfully. Jan 30 13:57:08.869544 systemd[1]: Started sshd@229-172.31.21.135:22-209.38.146.62:53012.service - OpenSSH per-connection server daemon (209.38.146.62:53012). Jan 30 13:57:08.971654 sshd[4669]: Invalid user ubuntu from 209.38.146.62 port 53012 Jan 30 13:57:08.992345 sshd[4669]: Connection closed by invalid user ubuntu 209.38.146.62 port 53012 [preauth] Jan 30 13:57:08.994825 systemd[1]: sshd@229-172.31.21.135:22-209.38.146.62:53012.service: Deactivated successfully. Jan 30 13:57:09.037099 systemd[1]: Started sshd@230-172.31.21.135:22-209.38.146.62:53020.service - OpenSSH per-connection server daemon (209.38.146.62:53020). Jan 30 13:57:09.162366 sshd[4674]: Invalid user ubuntu from 209.38.146.62 port 53020 Jan 30 13:57:09.183493 sshd[4674]: Connection closed by invalid user ubuntu 209.38.146.62 port 53020 [preauth] Jan 30 13:57:09.186324 systemd[1]: sshd@230-172.31.21.135:22-209.38.146.62:53020.service: Deactivated successfully. Jan 30 13:57:09.215333 systemd[1]: Started sshd@231-172.31.21.135:22-209.38.146.62:53028.service - OpenSSH per-connection server daemon (209.38.146.62:53028). Jan 30 13:57:09.334945 sshd[4679]: Invalid user ubuntu from 209.38.146.62 port 53028 Jan 30 13:57:09.355345 sshd[4679]: Connection closed by invalid user ubuntu 209.38.146.62 port 53028 [preauth] Jan 30 13:57:09.358118 systemd[1]: sshd@231-172.31.21.135:22-209.38.146.62:53028.service: Deactivated successfully. Jan 30 13:57:09.406656 systemd[1]: Started sshd@232-172.31.21.135:22-209.38.146.62:53036.service - OpenSSH per-connection server daemon (209.38.146.62:53036). Jan 30 13:57:09.566230 sshd[4684]: Invalid user ubuntu from 209.38.146.62 port 53036 Jan 30 13:57:09.587741 sshd[4684]: Connection closed by invalid user ubuntu 209.38.146.62 port 53036 [preauth] Jan 30 13:57:09.590208 systemd[1]: sshd@232-172.31.21.135:22-209.38.146.62:53036.service: Deactivated successfully. Jan 30 13:57:09.625206 systemd[1]: Started sshd@233-172.31.21.135:22-209.38.146.62:53044.service - OpenSSH per-connection server daemon (209.38.146.62:53044). Jan 30 13:57:09.735853 sshd[4689]: Invalid user ubuntu from 209.38.146.62 port 53044 Jan 30 13:57:09.758244 sshd[4689]: Connection closed by invalid user ubuntu 209.38.146.62 port 53044 [preauth] Jan 30 13:57:09.760696 systemd[1]: sshd@233-172.31.21.135:22-209.38.146.62:53044.service: Deactivated successfully. Jan 30 13:57:09.795080 systemd[1]: Started sshd@234-172.31.21.135:22-209.38.146.62:53060.service - OpenSSH per-connection server daemon (209.38.146.62:53060). Jan 30 13:57:09.910850 sshd[4694]: Invalid user ubuntu from 209.38.146.62 port 53060 Jan 30 13:57:09.931367 sshd[4694]: Connection closed by invalid user ubuntu 209.38.146.62 port 53060 [preauth] Jan 30 13:57:09.933816 systemd[1]: sshd@234-172.31.21.135:22-209.38.146.62:53060.service: Deactivated successfully. Jan 30 13:57:09.961464 systemd[1]: Started sshd@235-172.31.21.135:22-209.38.146.62:53074.service - OpenSSH per-connection server daemon (209.38.146.62:53074). Jan 30 13:57:10.073711 sshd[4699]: Invalid user ubuntu from 209.38.146.62 port 53074 Jan 30 13:57:10.095153 sshd[4699]: Connection closed by invalid user ubuntu 209.38.146.62 port 53074 [preauth] Jan 30 13:57:10.097900 systemd[1]: sshd@235-172.31.21.135:22-209.38.146.62:53074.service: Deactivated successfully. Jan 30 13:57:10.131781 systemd[1]: Started sshd@236-172.31.21.135:22-209.38.146.62:53084.service - OpenSSH per-connection server daemon (209.38.146.62:53084). Jan 30 13:57:10.239555 sshd[4704]: Invalid user ubuntu from 209.38.146.62 port 53084 Jan 30 13:57:10.260861 sshd[4704]: Connection closed by invalid user ubuntu 209.38.146.62 port 53084 [preauth] Jan 30 13:57:10.263084 systemd[1]: sshd@236-172.31.21.135:22-209.38.146.62:53084.service: Deactivated successfully. Jan 30 13:57:10.295214 systemd[1]: Started sshd@237-172.31.21.135:22-209.38.146.62:53086.service - OpenSSH per-connection server daemon (209.38.146.62:53086). Jan 30 13:57:10.412537 sshd[4709]: Invalid user ubuntu from 209.38.146.62 port 53086 Jan 30 13:57:10.435060 sshd[4709]: Connection closed by invalid user ubuntu 209.38.146.62 port 53086 [preauth] Jan 30 13:57:10.438274 systemd[1]: sshd@237-172.31.21.135:22-209.38.146.62:53086.service: Deactivated successfully. Jan 30 13:57:10.473889 systemd[1]: Started sshd@238-172.31.21.135:22-209.38.146.62:53096.service - OpenSSH per-connection server daemon (209.38.146.62:53096). Jan 30 13:57:10.597045 sshd[4720]: Invalid user ubuntu from 209.38.146.62 port 53096 Jan 30 13:57:10.618007 sshd[4720]: Connection closed by invalid user ubuntu 209.38.146.62 port 53096 [preauth] Jan 30 13:57:10.620951 systemd[1]: sshd@238-172.31.21.135:22-209.38.146.62:53096.service: Deactivated successfully. Jan 30 13:57:10.659184 systemd[1]: Started sshd@239-172.31.21.135:22-209.38.146.62:53108.service - OpenSSH per-connection server daemon (209.38.146.62:53108). Jan 30 13:57:10.772719 sshd[4725]: Invalid user ubuntu from 209.38.146.62 port 53108 Jan 30 13:57:10.793251 sshd[4725]: Connection closed by invalid user ubuntu 209.38.146.62 port 53108 [preauth] Jan 30 13:57:10.796029 systemd[1]: sshd@239-172.31.21.135:22-209.38.146.62:53108.service: Deactivated successfully. Jan 30 13:57:10.835997 systemd[1]: Started sshd@240-172.31.21.135:22-209.38.146.62:53124.service - OpenSSH per-connection server daemon (209.38.146.62:53124). Jan 30 13:57:10.972710 sshd[4730]: Invalid user ubuntu from 209.38.146.62 port 53124 Jan 30 13:57:10.993474 sshd[4730]: Connection closed by invalid user ubuntu 209.38.146.62 port 53124 [preauth] Jan 30 13:57:10.996449 systemd[1]: sshd@240-172.31.21.135:22-209.38.146.62:53124.service: Deactivated successfully. Jan 30 13:57:11.042118 systemd[1]: Started sshd@241-172.31.21.135:22-209.38.146.62:53132.service - OpenSSH per-connection server daemon (209.38.146.62:53132). Jan 30 13:57:11.170559 sshd[4735]: Invalid user ubuntu from 209.38.146.62 port 53132 Jan 30 13:57:11.191553 sshd[4735]: Connection closed by invalid user ubuntu 209.38.146.62 port 53132 [preauth] Jan 30 13:57:11.194856 systemd[1]: sshd@241-172.31.21.135:22-209.38.146.62:53132.service: Deactivated successfully. Jan 30 13:57:11.235911 systemd[1]: Started sshd@242-172.31.21.135:22-209.38.146.62:53138.service - OpenSSH per-connection server daemon (209.38.146.62:53138). Jan 30 13:57:11.337820 sshd[4740]: Invalid user ubuntu from 209.38.146.62 port 53138 Jan 30 13:57:11.358894 sshd[4740]: Connection closed by invalid user ubuntu 209.38.146.62 port 53138 [preauth] Jan 30 13:57:11.362257 systemd[1]: sshd@242-172.31.21.135:22-209.38.146.62:53138.service: Deactivated successfully. Jan 30 13:57:11.391548 systemd[1]: Started sshd@243-172.31.21.135:22-209.38.146.62:53150.service - OpenSSH per-connection server daemon (209.38.146.62:53150). Jan 30 13:57:11.509122 sshd[4745]: Invalid user ubuntu from 209.38.146.62 port 53150 Jan 30 13:57:11.531804 sshd[4745]: Connection closed by invalid user ubuntu 209.38.146.62 port 53150 [preauth] Jan 30 13:57:11.537498 systemd[1]: sshd@243-172.31.21.135:22-209.38.146.62:53150.service: Deactivated successfully. Jan 30 13:57:11.570348 systemd[1]: Started sshd@244-172.31.21.135:22-209.38.146.62:53164.service - OpenSSH per-connection server daemon (209.38.146.62:53164). Jan 30 13:57:11.698804 sshd[4750]: Invalid user ubuntu from 209.38.146.62 port 53164 Jan 30 13:57:11.719979 sshd[4750]: Connection closed by invalid user ubuntu 209.38.146.62 port 53164 [preauth] Jan 30 13:57:11.723465 systemd[1]: sshd@244-172.31.21.135:22-209.38.146.62:53164.service: Deactivated successfully. Jan 30 13:57:11.766364 systemd[1]: Started sshd@245-172.31.21.135:22-209.38.146.62:53166.service - OpenSSH per-connection server daemon (209.38.146.62:53166). Jan 30 13:57:11.887397 sshd[4755]: Invalid user ubuntu from 209.38.146.62 port 53166 Jan 30 13:57:11.913871 sshd[4755]: Connection closed by invalid user ubuntu 209.38.146.62 port 53166 [preauth] Jan 30 13:57:11.920198 systemd[1]: sshd@245-172.31.21.135:22-209.38.146.62:53166.service: Deactivated successfully. Jan 30 13:57:11.953308 systemd[1]: Started sshd@246-172.31.21.135:22-209.38.146.62:53172.service - OpenSSH per-connection server daemon (209.38.146.62:53172). Jan 30 13:57:12.116227 sshd[4760]: Invalid user ubuntu from 209.38.146.62 port 53172 Jan 30 13:57:12.136473 sshd[4760]: Connection closed by invalid user ubuntu 209.38.146.62 port 53172 [preauth] Jan 30 13:57:12.139258 systemd[1]: sshd@246-172.31.21.135:22-209.38.146.62:53172.service: Deactivated successfully. Jan 30 13:57:12.170260 systemd[1]: Started sshd@247-172.31.21.135:22-209.38.146.62:53186.service - OpenSSH per-connection server daemon (209.38.146.62:53186). Jan 30 13:57:12.295457 sshd[4765]: Invalid user ubuntu from 209.38.146.62 port 53186 Jan 30 13:57:12.316508 sshd[4765]: Connection closed by invalid user ubuntu 209.38.146.62 port 53186 [preauth] Jan 30 13:57:12.319810 systemd[1]: sshd@247-172.31.21.135:22-209.38.146.62:53186.service: Deactivated successfully. Jan 30 13:57:12.361198 systemd[1]: Started sshd@248-172.31.21.135:22-209.38.146.62:53200.service - OpenSSH per-connection server daemon (209.38.146.62:53200). Jan 30 13:57:12.480726 sshd[4770]: Invalid user ubuntu from 209.38.146.62 port 53200 Jan 30 13:57:12.506402 sshd[4770]: Connection closed by invalid user ubuntu 209.38.146.62 port 53200 [preauth] Jan 30 13:57:12.510501 systemd[1]: sshd@248-172.31.21.135:22-209.38.146.62:53200.service: Deactivated successfully. Jan 30 13:57:12.556349 systemd[1]: Started sshd@249-172.31.21.135:22-209.38.146.62:53216.service - OpenSSH per-connection server daemon (209.38.146.62:53216). Jan 30 13:57:12.671295 sshd[4775]: Invalid user ubuntu from 209.38.146.62 port 53216 Jan 30 13:57:12.692014 sshd[4775]: Connection closed by invalid user ubuntu 209.38.146.62 port 53216 [preauth] Jan 30 13:57:12.694408 systemd[1]: sshd@249-172.31.21.135:22-209.38.146.62:53216.service: Deactivated successfully. Jan 30 13:57:12.730061 systemd[1]: Started sshd@250-172.31.21.135:22-209.38.146.62:53230.service - OpenSSH per-connection server daemon (209.38.146.62:53230). Jan 30 13:57:12.829024 sshd[4780]: Invalid user ubuntu from 209.38.146.62 port 53230 Jan 30 13:57:12.849448 sshd[4780]: Connection closed by invalid user ubuntu 209.38.146.62 port 53230 [preauth] Jan 30 13:57:12.852248 systemd[1]: sshd@250-172.31.21.135:22-209.38.146.62:53230.service: Deactivated successfully. Jan 30 13:57:12.887088 systemd[1]: Started sshd@251-172.31.21.135:22-209.38.146.62:53236.service - OpenSSH per-connection server daemon (209.38.146.62:53236). Jan 30 13:57:12.991161 sshd[4785]: Invalid user ubuntu from 209.38.146.62 port 53236 Jan 30 13:57:13.011947 sshd[4785]: Connection closed by invalid user ubuntu 209.38.146.62 port 53236 [preauth] Jan 30 13:57:13.014860 systemd[1]: sshd@251-172.31.21.135:22-209.38.146.62:53236.service: Deactivated successfully. Jan 30 13:57:13.045753 systemd[1]: Started sshd@252-172.31.21.135:22-209.38.146.62:53246.service - OpenSSH per-connection server daemon (209.38.146.62:53246). Jan 30 13:57:13.151869 sshd[4790]: Invalid user ubuntu from 209.38.146.62 port 53246 Jan 30 13:57:13.172915 sshd[4790]: Connection closed by invalid user ubuntu 209.38.146.62 port 53246 [preauth] Jan 30 13:57:13.175760 systemd[1]: sshd@252-172.31.21.135:22-209.38.146.62:53246.service: Deactivated successfully. Jan 30 13:57:13.211384 systemd[1]: Started sshd@253-172.31.21.135:22-209.38.146.62:53260.service - OpenSSH per-connection server daemon (209.38.146.62:53260). Jan 30 13:57:13.319504 sshd[4795]: Invalid user ubuntu from 209.38.146.62 port 53260 Jan 30 13:57:13.341009 sshd[4795]: Connection closed by invalid user ubuntu 209.38.146.62 port 53260 [preauth] Jan 30 13:57:13.343267 systemd[1]: sshd@253-172.31.21.135:22-209.38.146.62:53260.service: Deactivated successfully. Jan 30 13:57:13.377138 systemd[1]: Started sshd@254-172.31.21.135:22-209.38.146.62:53274.service - OpenSSH per-connection server daemon (209.38.146.62:53274). Jan 30 13:57:13.486648 sshd[4800]: Invalid user ubuntu from 209.38.146.62 port 53274 Jan 30 13:57:13.508339 sshd[4800]: Connection closed by invalid user ubuntu 209.38.146.62 port 53274 [preauth] Jan 30 13:57:13.524377 systemd[1]: sshd@254-172.31.21.135:22-209.38.146.62:53274.service: Deactivated successfully. Jan 30 13:57:13.565728 systemd[1]: Started sshd@255-172.31.21.135:22-209.38.146.62:53284.service - OpenSSH per-connection server daemon (209.38.146.62:53284). Jan 30 13:57:13.691902 sshd[4805]: Invalid user ubuntu from 209.38.146.62 port 53284 Jan 30 13:57:13.713158 sshd[4805]: Connection closed by invalid user ubuntu 209.38.146.62 port 53284 [preauth] Jan 30 13:57:13.715663 systemd[1]: sshd@255-172.31.21.135:22-209.38.146.62:53284.service: Deactivated successfully. Jan 30 13:57:13.751093 systemd[1]: Started sshd@256-172.31.21.135:22-209.38.146.62:53288.service - OpenSSH per-connection server daemon (209.38.146.62:53288). Jan 30 13:57:13.892767 sshd[4810]: Invalid user ubuntu from 209.38.146.62 port 53288 Jan 30 13:57:13.913715 sshd[4810]: Connection closed by invalid user ubuntu 209.38.146.62 port 53288 [preauth] Jan 30 13:57:13.917888 systemd[1]: sshd@256-172.31.21.135:22-209.38.146.62:53288.service: Deactivated successfully. Jan 30 13:57:13.953152 systemd[1]: Started sshd@257-172.31.21.135:22-209.38.146.62:53304.service - OpenSSH per-connection server daemon (209.38.146.62:53304). Jan 30 13:57:14.077284 sshd[4815]: Invalid user ubuntu from 209.38.146.62 port 53304 Jan 30 13:57:14.097835 sshd[4815]: Connection closed by invalid user ubuntu 209.38.146.62 port 53304 [preauth] Jan 30 13:57:14.101412 systemd[1]: sshd@257-172.31.21.135:22-209.38.146.62:53304.service: Deactivated successfully. Jan 30 13:57:14.134153 systemd[1]: Started sshd@258-172.31.21.135:22-209.38.146.62:53306.service - OpenSSH per-connection server daemon (209.38.146.62:53306). Jan 30 13:57:14.251659 sshd[4820]: Invalid user ubuntu from 209.38.146.62 port 53306 Jan 30 13:57:14.272009 sshd[4820]: Connection closed by invalid user ubuntu 209.38.146.62 port 53306 [preauth] Jan 30 13:57:14.274773 systemd[1]: sshd@258-172.31.21.135:22-209.38.146.62:53306.service: Deactivated successfully. Jan 30 13:57:14.307868 systemd[1]: Started sshd@259-172.31.21.135:22-209.38.146.62:53320.service - OpenSSH per-connection server daemon (209.38.146.62:53320). Jan 30 13:57:14.422422 sshd[4825]: Invalid user ubuntu from 209.38.146.62 port 53320 Jan 30 13:57:14.443582 sshd[4825]: Connection closed by invalid user ubuntu 209.38.146.62 port 53320 [preauth] Jan 30 13:57:14.450028 systemd[1]: sshd@259-172.31.21.135:22-209.38.146.62:53320.service: Deactivated successfully. Jan 30 13:57:14.488314 systemd[1]: Started sshd@260-172.31.21.135:22-209.38.146.62:53332.service - OpenSSH per-connection server daemon (209.38.146.62:53332). Jan 30 13:57:14.631064 sshd[4830]: Invalid user ubuntu from 209.38.146.62 port 53332 Jan 30 13:57:14.652359 sshd[4830]: Connection closed by invalid user ubuntu 209.38.146.62 port 53332 [preauth] Jan 30 13:57:14.655367 systemd[1]: sshd@260-172.31.21.135:22-209.38.146.62:53332.service: Deactivated successfully. Jan 30 13:57:14.688129 systemd[1]: Started sshd@261-172.31.21.135:22-209.38.146.62:53344.service - OpenSSH per-connection server daemon (209.38.146.62:53344). Jan 30 13:57:14.828081 sshd[4835]: Invalid user ubuntu from 209.38.146.62 port 53344 Jan 30 13:57:14.849642 sshd[4835]: Connection closed by invalid user ubuntu 209.38.146.62 port 53344 [preauth] Jan 30 13:57:14.852875 systemd[1]: sshd@261-172.31.21.135:22-209.38.146.62:53344.service: Deactivated successfully. Jan 30 13:57:14.880760 systemd[1]: Started sshd@262-172.31.21.135:22-209.38.146.62:53346.service - OpenSSH per-connection server daemon (209.38.146.62:53346). Jan 30 13:57:14.994095 sshd[4840]: Invalid user ubuntu from 209.38.146.62 port 53346 Jan 30 13:57:15.014852 sshd[4840]: Connection closed by invalid user ubuntu 209.38.146.62 port 53346 [preauth] Jan 30 13:57:15.020508 systemd[1]: sshd@262-172.31.21.135:22-209.38.146.62:53346.service: Deactivated successfully. Jan 30 13:57:15.063121 systemd[1]: Started sshd@263-172.31.21.135:22-209.38.146.62:53352.service - OpenSSH per-connection server daemon (209.38.146.62:53352). Jan 30 13:57:15.206036 sshd[4845]: Invalid user ubuntu from 209.38.146.62 port 53352 Jan 30 13:57:15.227744 sshd[4845]: Connection closed by invalid user ubuntu 209.38.146.62 port 53352 [preauth] Jan 30 13:57:15.230836 systemd[1]: sshd@263-172.31.21.135:22-209.38.146.62:53352.service: Deactivated successfully. Jan 30 13:57:15.260081 systemd[1]: Started sshd@264-172.31.21.135:22-209.38.146.62:53368.service - OpenSSH per-connection server daemon (209.38.146.62:53368). Jan 30 13:57:15.375142 sshd[4850]: Invalid user ubuntu from 209.38.146.62 port 53368 Jan 30 13:57:15.400457 sshd[4850]: Connection closed by invalid user ubuntu 209.38.146.62 port 53368 [preauth] Jan 30 13:57:15.401176 systemd[1]: sshd@264-172.31.21.135:22-209.38.146.62:53368.service: Deactivated successfully. Jan 30 13:57:15.437073 systemd[1]: Started sshd@265-172.31.21.135:22-209.38.146.62:53384.service - OpenSSH per-connection server daemon (209.38.146.62:53384). Jan 30 13:57:15.542499 sshd[4861]: Invalid user ubuntu from 209.38.146.62 port 53384 Jan 30 13:57:15.562565 sshd[4861]: Connection closed by invalid user ubuntu 209.38.146.62 port 53384 [preauth] Jan 30 13:57:15.565493 systemd[1]: sshd@265-172.31.21.135:22-209.38.146.62:53384.service: Deactivated successfully. Jan 30 13:57:15.599105 systemd[1]: Started sshd@266-172.31.21.135:22-209.38.146.62:53390.service - OpenSSH per-connection server daemon (209.38.146.62:53390). Jan 30 13:57:15.699048 sshd[4866]: Invalid user ubuntu from 209.38.146.62 port 53390 Jan 30 13:57:15.719569 sshd[4866]: Connection closed by invalid user ubuntu 209.38.146.62 port 53390 [preauth] Jan 30 13:57:15.722302 systemd[1]: sshd@266-172.31.21.135:22-209.38.146.62:53390.service: Deactivated successfully. Jan 30 13:57:15.760184 systemd[1]: Started sshd@267-172.31.21.135:22-209.38.146.62:53392.service - OpenSSH per-connection server daemon (209.38.146.62:53392). Jan 30 13:57:15.877457 sshd[4871]: Invalid user ubuntu from 209.38.146.62 port 53392 Jan 30 13:57:15.897652 sshd[4871]: Connection closed by invalid user ubuntu 209.38.146.62 port 53392 [preauth] Jan 30 13:57:15.902460 systemd[1]: sshd@267-172.31.21.135:22-209.38.146.62:53392.service: Deactivated successfully. Jan 30 13:57:15.931470 systemd[1]: Started sshd@268-172.31.21.135:22-209.38.146.62:53408.service - OpenSSH per-connection server daemon (209.38.146.62:53408). Jan 30 13:57:16.040047 sshd[4876]: Invalid user ubuntu from 209.38.146.62 port 53408 Jan 30 13:57:16.061427 sshd[4876]: Connection closed by invalid user ubuntu 209.38.146.62 port 53408 [preauth] Jan 30 13:57:16.064229 systemd[1]: sshd@268-172.31.21.135:22-209.38.146.62:53408.service: Deactivated successfully. Jan 30 13:57:16.097916 systemd[1]: Started sshd@269-172.31.21.135:22-209.38.146.62:53420.service - OpenSSH per-connection server daemon (209.38.146.62:53420). Jan 30 13:57:16.219122 sshd[4881]: Invalid user ubuntu from 209.38.146.62 port 53420 Jan 30 13:57:16.240145 sshd[4881]: Connection closed by invalid user ubuntu 209.38.146.62 port 53420 [preauth] Jan 30 13:57:16.243153 systemd[1]: sshd@269-172.31.21.135:22-209.38.146.62:53420.service: Deactivated successfully. Jan 30 13:57:16.291126 systemd[1]: Started sshd@270-172.31.21.135:22-209.38.146.62:53432.service - OpenSSH per-connection server daemon (209.38.146.62:53432). Jan 30 13:57:16.410946 sshd[4886]: Invalid user ubuntu from 209.38.146.62 port 53432 Jan 30 13:57:16.432073 sshd[4886]: Connection closed by invalid user ubuntu 209.38.146.62 port 53432 [preauth] Jan 30 13:57:16.435111 systemd[1]: sshd@270-172.31.21.135:22-209.38.146.62:53432.service: Deactivated successfully. Jan 30 13:57:16.464658 systemd[1]: Started sshd@271-172.31.21.135:22-209.38.146.62:53440.service - OpenSSH per-connection server daemon (209.38.146.62:53440). Jan 30 13:57:16.584773 sshd[4891]: Invalid user ubuntu from 209.38.146.62 port 53440 Jan 30 13:57:16.605847 sshd[4891]: Connection closed by invalid user ubuntu 209.38.146.62 port 53440 [preauth] Jan 30 13:57:16.608493 systemd[1]: sshd@271-172.31.21.135:22-209.38.146.62:53440.service: Deactivated successfully. Jan 30 13:57:16.646183 systemd[1]: Started sshd@272-172.31.21.135:22-209.38.146.62:53448.service - OpenSSH per-connection server daemon (209.38.146.62:53448). Jan 30 13:57:16.766345 sshd[4896]: Invalid user ubuntu from 209.38.146.62 port 53448 Jan 30 13:57:16.787808 sshd[4896]: Connection closed by invalid user ubuntu 209.38.146.62 port 53448 [preauth] Jan 30 13:57:16.791012 systemd[1]: sshd@272-172.31.21.135:22-209.38.146.62:53448.service: Deactivated successfully. Jan 30 13:57:16.829262 systemd[1]: Started sshd@273-172.31.21.135:22-209.38.146.62:53462.service - OpenSSH per-connection server daemon (209.38.146.62:53462). Jan 30 13:57:16.946266 sshd[4901]: Invalid user ubuntu from 209.38.146.62 port 53462 Jan 30 13:57:16.966959 sshd[4901]: Connection closed by invalid user ubuntu 209.38.146.62 port 53462 [preauth] Jan 30 13:57:16.970894 systemd[1]: sshd@273-172.31.21.135:22-209.38.146.62:53462.service: Deactivated successfully. Jan 30 13:57:17.008092 systemd[1]: Started sshd@274-172.31.21.135:22-209.38.146.62:53470.service - OpenSSH per-connection server daemon (209.38.146.62:53470). Jan 30 13:57:17.124165 sshd[4906]: Invalid user debian from 209.38.146.62 port 53470 Jan 30 13:57:17.145665 sshd[4906]: Connection closed by invalid user debian 209.38.146.62 port 53470 [preauth] Jan 30 13:57:17.150009 systemd[1]: sshd@274-172.31.21.135:22-209.38.146.62:53470.service: Deactivated successfully. Jan 30 13:57:17.186212 systemd[1]: Started sshd@275-172.31.21.135:22-209.38.146.62:53484.service - OpenSSH per-connection server daemon (209.38.146.62:53484). Jan 30 13:57:17.288519 sshd[4911]: Invalid user debian from 209.38.146.62 port 53484 Jan 30 13:57:17.309288 sshd[4911]: Connection closed by invalid user debian 209.38.146.62 port 53484 [preauth] Jan 30 13:57:17.312115 systemd[1]: sshd@275-172.31.21.135:22-209.38.146.62:53484.service: Deactivated successfully. Jan 30 13:57:17.345045 systemd[1]: Started sshd@276-172.31.21.135:22-209.38.146.62:53486.service - OpenSSH per-connection server daemon (209.38.146.62:53486). Jan 30 13:57:17.457271 sshd[4916]: Invalid user debian from 209.38.146.62 port 53486 Jan 30 13:57:17.477720 sshd[4916]: Connection closed by invalid user debian 209.38.146.62 port 53486 [preauth] Jan 30 13:57:17.480463 systemd[1]: sshd@276-172.31.21.135:22-209.38.146.62:53486.service: Deactivated successfully. Jan 30 13:57:17.517468 systemd[1]: Started sshd@277-172.31.21.135:22-209.38.146.62:53488.service - OpenSSH per-connection server daemon (209.38.146.62:53488). Jan 30 13:57:17.644399 sshd[4921]: Invalid user debian from 209.38.146.62 port 53488 Jan 30 13:57:17.665760 sshd[4921]: Connection closed by invalid user debian 209.38.146.62 port 53488 [preauth] Jan 30 13:57:17.668290 systemd[1]: sshd@277-172.31.21.135:22-209.38.146.62:53488.service: Deactivated successfully. Jan 30 13:57:17.705124 systemd[1]: Started sshd@278-172.31.21.135:22-209.38.146.62:53504.service - OpenSSH per-connection server daemon (209.38.146.62:53504). Jan 30 13:57:17.812207 sshd[4926]: Invalid user debian from 209.38.146.62 port 53504 Jan 30 13:57:17.833328 sshd[4926]: Connection closed by invalid user debian 209.38.146.62 port 53504 [preauth] Jan 30 13:57:17.839300 systemd[1]: sshd@278-172.31.21.135:22-209.38.146.62:53504.service: Deactivated successfully. Jan 30 13:57:17.871143 systemd[1]: Started sshd@279-172.31.21.135:22-209.38.146.62:53514.service - OpenSSH per-connection server daemon (209.38.146.62:53514). Jan 30 13:57:17.971436 sshd[4931]: Invalid user debian from 209.38.146.62 port 53514 Jan 30 13:57:17.992409 sshd[4931]: Connection closed by invalid user debian 209.38.146.62 port 53514 [preauth] Jan 30 13:57:17.995289 systemd[1]: sshd@279-172.31.21.135:22-209.38.146.62:53514.service: Deactivated successfully. Jan 30 13:57:18.031169 systemd[1]: Started sshd@280-172.31.21.135:22-209.38.146.62:53516.service - OpenSSH per-connection server daemon (209.38.146.62:53516). Jan 30 13:57:18.150015 sshd[4936]: Invalid user debian from 209.38.146.62 port 53516 Jan 30 13:57:18.170851 sshd[4936]: Connection closed by invalid user debian 209.38.146.62 port 53516 [preauth] Jan 30 13:57:18.173590 systemd[1]: sshd@280-172.31.21.135:22-209.38.146.62:53516.service: Deactivated successfully. Jan 30 13:57:18.219456 systemd[1]: Started sshd@281-172.31.21.135:22-209.38.146.62:53526.service - OpenSSH per-connection server daemon (209.38.146.62:53526). Jan 30 13:57:18.320737 sshd[4941]: Invalid user debian from 209.38.146.62 port 53526 Jan 30 13:57:18.341721 sshd[4941]: Connection closed by invalid user debian 209.38.146.62 port 53526 [preauth] Jan 30 13:57:18.344219 systemd[1]: sshd@281-172.31.21.135:22-209.38.146.62:53526.service: Deactivated successfully. Jan 30 13:57:18.376191 systemd[1]: Started sshd@282-172.31.21.135:22-209.38.146.62:53538.service - OpenSSH per-connection server daemon (209.38.146.62:53538). Jan 30 13:57:18.492735 sshd[4946]: Invalid user debian from 209.38.146.62 port 53538 Jan 30 13:57:18.513968 sshd[4946]: Connection closed by invalid user debian 209.38.146.62 port 53538 [preauth] Jan 30 13:57:18.517636 systemd[1]: sshd@282-172.31.21.135:22-209.38.146.62:53538.service: Deactivated successfully. Jan 30 13:57:18.553088 systemd[1]: Started sshd@283-172.31.21.135:22-209.38.146.62:53544.service - OpenSSH per-connection server daemon (209.38.146.62:53544). Jan 30 13:57:18.676617 sshd[4951]: Invalid user debian from 209.38.146.62 port 53544 Jan 30 13:57:18.697473 sshd[4951]: Connection closed by invalid user debian 209.38.146.62 port 53544 [preauth] Jan 30 13:57:18.701015 systemd[1]: sshd@283-172.31.21.135:22-209.38.146.62:53544.service: Deactivated successfully. Jan 30 13:57:18.732073 systemd[1]: Started sshd@284-172.31.21.135:22-209.38.146.62:53546.service - OpenSSH per-connection server daemon (209.38.146.62:53546). Jan 30 13:57:18.880590 sshd[4956]: Invalid user debian from 209.38.146.62 port 53546 Jan 30 13:57:18.901447 sshd[4956]: Connection closed by invalid user debian 209.38.146.62 port 53546 [preauth] Jan 30 13:57:18.906025 systemd[1]: sshd@284-172.31.21.135:22-209.38.146.62:53546.service: Deactivated successfully. Jan 30 13:57:18.944898 systemd[1]: Started sshd@285-172.31.21.135:22-209.38.146.62:53554.service - OpenSSH per-connection server daemon (209.38.146.62:53554). Jan 30 13:57:19.091707 sshd[4961]: Invalid user debian from 209.38.146.62 port 53554 Jan 30 13:57:19.112893 sshd[4961]: Connection closed by invalid user debian 209.38.146.62 port 53554 [preauth] Jan 30 13:57:19.115942 systemd[1]: sshd@285-172.31.21.135:22-209.38.146.62:53554.service: Deactivated successfully. Jan 30 13:57:19.151110 systemd[1]: Started sshd@286-172.31.21.135:22-209.38.146.62:53560.service - OpenSSH per-connection server daemon (209.38.146.62:53560). Jan 30 13:57:19.295211 sshd[4966]: Invalid user debian from 209.38.146.62 port 53560 Jan 30 13:57:19.318846 sshd[4966]: Connection closed by invalid user debian 209.38.146.62 port 53560 [preauth] Jan 30 13:57:19.323137 systemd[1]: sshd@286-172.31.21.135:22-209.38.146.62:53560.service: Deactivated successfully. Jan 30 13:57:19.355124 systemd[1]: Started sshd@287-172.31.21.135:22-209.38.146.62:53566.service - OpenSSH per-connection server daemon (209.38.146.62:53566). Jan 30 13:57:19.483433 sshd[4971]: Invalid user debian from 209.38.146.62 port 53566 Jan 30 13:57:19.504242 sshd[4971]: Connection closed by invalid user debian 209.38.146.62 port 53566 [preauth] Jan 30 13:57:19.507067 systemd[1]: sshd@287-172.31.21.135:22-209.38.146.62:53566.service: Deactivated successfully. Jan 30 13:57:19.548170 systemd[1]: Started sshd@288-172.31.21.135:22-209.38.146.62:53576.service - OpenSSH per-connection server daemon (209.38.146.62:53576). Jan 30 13:57:19.673739 sshd[4976]: Invalid user debian from 209.38.146.62 port 53576 Jan 30 13:57:19.696047 sshd[4976]: Connection closed by invalid user debian 209.38.146.62 port 53576 [preauth] Jan 30 13:57:19.698966 systemd[1]: sshd@288-172.31.21.135:22-209.38.146.62:53576.service: Deactivated successfully. Jan 30 13:57:19.735153 systemd[1]: Started sshd@289-172.31.21.135:22-209.38.146.62:53586.service - OpenSSH per-connection server daemon (209.38.146.62:53586). Jan 30 13:57:19.838559 sshd[4981]: Invalid user debian from 209.38.146.62 port 53586 Jan 30 13:57:19.863845 sshd[4981]: Connection closed by invalid user debian 209.38.146.62 port 53586 [preauth] Jan 30 13:57:19.868819 systemd[1]: sshd@289-172.31.21.135:22-209.38.146.62:53586.service: Deactivated successfully. Jan 30 13:57:19.899136 systemd[1]: Started sshd@290-172.31.21.135:22-209.38.146.62:53602.service - OpenSSH per-connection server daemon (209.38.146.62:53602). Jan 30 13:57:20.025085 sshd[4986]: Invalid user debian from 209.38.146.62 port 53602 Jan 30 13:57:20.045932 sshd[4986]: Connection closed by invalid user debian 209.38.146.62 port 53602 [preauth] Jan 30 13:57:20.048273 systemd[1]: sshd@290-172.31.21.135:22-209.38.146.62:53602.service: Deactivated successfully. Jan 30 13:57:20.082228 systemd[1]: Started sshd@291-172.31.21.135:22-209.38.146.62:53610.service - OpenSSH per-connection server daemon (209.38.146.62:53610). Jan 30 13:57:20.185088 sshd[4991]: Invalid user debian from 209.38.146.62 port 53610 Jan 30 13:57:20.206497 sshd[4991]: Connection closed by invalid user debian 209.38.146.62 port 53610 [preauth] Jan 30 13:57:20.209510 systemd[1]: sshd@291-172.31.21.135:22-209.38.146.62:53610.service: Deactivated successfully. Jan 30 13:57:20.244060 systemd[1]: Started sshd@292-172.31.21.135:22-209.38.146.62:53626.service - OpenSSH per-connection server daemon (209.38.146.62:53626). Jan 30 13:57:20.374164 sshd[4996]: Invalid user debian from 209.38.146.62 port 53626 Jan 30 13:57:20.394813 sshd[4996]: Connection closed by invalid user debian 209.38.146.62 port 53626 [preauth] Jan 30 13:57:20.397839 systemd[1]: sshd@292-172.31.21.135:22-209.38.146.62:53626.service: Deactivated successfully. Jan 30 13:57:20.441489 systemd[1]: Started sshd@293-172.31.21.135:22-209.38.146.62:53634.service - OpenSSH per-connection server daemon (209.38.146.62:53634). Jan 30 13:57:20.569265 sshd[5007]: Invalid user debian from 209.38.146.62 port 53634 Jan 30 13:57:20.590537 sshd[5007]: Connection closed by invalid user debian 209.38.146.62 port 53634 [preauth] Jan 30 13:57:20.593222 systemd[1]: sshd@293-172.31.21.135:22-209.38.146.62:53634.service: Deactivated successfully. Jan 30 13:57:20.634436 systemd[1]: Started sshd@294-172.31.21.135:22-209.38.146.62:53650.service - OpenSSH per-connection server daemon (209.38.146.62:53650). Jan 30 13:57:20.757105 sshd[5012]: Invalid user debian from 209.38.146.62 port 53650 Jan 30 13:57:20.778263 sshd[5012]: Connection closed by invalid user debian 209.38.146.62 port 53650 [preauth] Jan 30 13:57:20.781281 systemd[1]: sshd@294-172.31.21.135:22-209.38.146.62:53650.service: Deactivated successfully. Jan 30 13:57:20.809652 systemd[1]: Started sshd@295-172.31.21.135:22-209.38.146.62:53662.service - OpenSSH per-connection server daemon (209.38.146.62:53662). Jan 30 13:57:20.923105 sshd[5017]: Invalid user debian from 209.38.146.62 port 53662 Jan 30 13:57:20.944042 sshd[5017]: Connection closed by invalid user debian 209.38.146.62 port 53662 [preauth] Jan 30 13:57:20.946541 systemd[1]: sshd@295-172.31.21.135:22-209.38.146.62:53662.service: Deactivated successfully. Jan 30 13:57:20.983051 systemd[1]: Started sshd@296-172.31.21.135:22-209.38.146.62:53674.service - OpenSSH per-connection server daemon (209.38.146.62:53674). Jan 30 13:57:21.105163 sshd[5022]: Invalid user debian from 209.38.146.62 port 53674 Jan 30 13:57:21.125851 sshd[5022]: Connection closed by invalid user debian 209.38.146.62 port 53674 [preauth] Jan 30 13:57:21.131212 systemd[1]: sshd@296-172.31.21.135:22-209.38.146.62:53674.service: Deactivated successfully. Jan 30 13:57:21.161094 systemd[1]: Started sshd@297-172.31.21.135:22-209.38.146.62:53688.service - OpenSSH per-connection server daemon (209.38.146.62:53688). Jan 30 13:57:21.274635 sshd[5027]: Invalid user debian from 209.38.146.62 port 53688 Jan 30 13:57:21.299119 sshd[5027]: Connection closed by invalid user debian 209.38.146.62 port 53688 [preauth] Jan 30 13:57:21.301453 systemd[1]: sshd@297-172.31.21.135:22-209.38.146.62:53688.service: Deactivated successfully. Jan 30 13:57:21.338046 systemd[1]: Started sshd@298-172.31.21.135:22-209.38.146.62:53690.service - OpenSSH per-connection server daemon (209.38.146.62:53690). Jan 30 13:57:21.454152 sshd[5032]: Invalid user debian from 209.38.146.62 port 53690 Jan 30 13:57:21.476404 sshd[5032]: Connection closed by invalid user debian 209.38.146.62 port 53690 [preauth] Jan 30 13:57:21.478788 systemd[1]: sshd@298-172.31.21.135:22-209.38.146.62:53690.service: Deactivated successfully. Jan 30 13:57:21.516373 systemd[1]: Started sshd@299-172.31.21.135:22-209.38.146.62:53696.service - OpenSSH per-connection server daemon (209.38.146.62:53696). Jan 30 13:57:21.627204 sshd[5037]: Invalid user debian from 209.38.146.62 port 53696 Jan 30 13:57:21.653545 sshd[5037]: Connection closed by invalid user debian 209.38.146.62 port 53696 [preauth] Jan 30 13:57:21.656328 systemd[1]: sshd@299-172.31.21.135:22-209.38.146.62:53696.service: Deactivated successfully. Jan 30 13:57:21.702086 systemd[1]: Started sshd@300-172.31.21.135:22-209.38.146.62:53706.service - OpenSSH per-connection server daemon (209.38.146.62:53706). Jan 30 13:57:21.842411 sshd[5043]: Invalid user debian from 209.38.146.62 port 53706 Jan 30 13:57:21.867112 sshd[5043]: Connection closed by invalid user debian 209.38.146.62 port 53706 [preauth] Jan 30 13:57:21.870372 systemd[1]: sshd@300-172.31.21.135:22-209.38.146.62:53706.service: Deactivated successfully. Jan 30 13:57:21.916191 systemd[1]: Started sshd@301-172.31.21.135:22-209.38.146.62:53714.service - OpenSSH per-connection server daemon (209.38.146.62:53714). Jan 30 13:57:22.057802 sshd[5048]: Invalid user debian from 209.38.146.62 port 53714 Jan 30 13:57:22.079078 sshd[5048]: Connection closed by invalid user debian 209.38.146.62 port 53714 [preauth] Jan 30 13:57:22.084978 systemd[1]: sshd@301-172.31.21.135:22-209.38.146.62:53714.service: Deactivated successfully. Jan 30 13:57:22.121157 systemd[1]: Started sshd@302-172.31.21.135:22-209.38.146.62:53728.service - OpenSSH per-connection server daemon (209.38.146.62:53728). Jan 30 13:57:22.273936 sshd[5053]: Invalid user debian from 209.38.146.62 port 53728 Jan 30 13:57:22.296184 sshd[5053]: Connection closed by invalid user debian 209.38.146.62 port 53728 [preauth] Jan 30 13:57:22.299055 systemd[1]: sshd@302-172.31.21.135:22-209.38.146.62:53728.service: Deactivated successfully. Jan 30 13:57:22.340092 systemd[1]: Started sshd@303-172.31.21.135:22-209.38.146.62:53742.service - OpenSSH per-connection server daemon (209.38.146.62:53742). Jan 30 13:57:22.449514 sshd[5058]: Invalid user debian from 209.38.146.62 port 53742 Jan 30 13:57:22.470282 sshd[5058]: Connection closed by invalid user debian 209.38.146.62 port 53742 [preauth] Jan 30 13:57:22.473283 systemd[1]: sshd@303-172.31.21.135:22-209.38.146.62:53742.service: Deactivated successfully. Jan 30 13:57:22.507532 systemd[1]: Started sshd@304-172.31.21.135:22-209.38.146.62:53748.service - OpenSSH per-connection server daemon (209.38.146.62:53748). Jan 30 13:57:22.625561 sshd[5063]: Invalid user debian from 209.38.146.62 port 53748 Jan 30 13:57:22.646363 sshd[5063]: Connection closed by invalid user debian 209.38.146.62 port 53748 [preauth] Jan 30 13:57:22.648786 systemd[1]: sshd@304-172.31.21.135:22-209.38.146.62:53748.service: Deactivated successfully. Jan 30 13:57:22.686309 systemd[1]: Started sshd@305-172.31.21.135:22-209.38.146.62:53754.service - OpenSSH per-connection server daemon (209.38.146.62:53754). Jan 30 13:57:22.795062 sshd[5068]: Invalid user debian from 209.38.146.62 port 53754 Jan 30 13:57:22.818549 sshd[5068]: Connection closed by invalid user debian 209.38.146.62 port 53754 [preauth] Jan 30 13:57:22.821003 systemd[1]: sshd@305-172.31.21.135:22-209.38.146.62:53754.service: Deactivated successfully. Jan 30 13:57:22.860142 systemd[1]: Started sshd@306-172.31.21.135:22-209.38.146.62:53756.service - OpenSSH per-connection server daemon (209.38.146.62:53756). Jan 30 13:57:22.988540 sshd[5073]: Invalid user debian from 209.38.146.62 port 53756 Jan 30 13:57:23.011756 sshd[5073]: Connection closed by invalid user debian 209.38.146.62 port 53756 [preauth] Jan 30 13:57:23.014443 systemd[1]: sshd@306-172.31.21.135:22-209.38.146.62:53756.service: Deactivated successfully. Jan 30 13:57:23.051090 systemd[1]: Started sshd@307-172.31.21.135:22-209.38.146.62:53762.service - OpenSSH per-connection server daemon (209.38.146.62:53762). Jan 30 13:57:23.180736 sshd[5078]: Invalid user debian from 209.38.146.62 port 53762 Jan 30 13:57:23.201503 sshd[5078]: Connection closed by invalid user debian 209.38.146.62 port 53762 [preauth] Jan 30 13:57:23.206727 systemd[1]: sshd@307-172.31.21.135:22-209.38.146.62:53762.service: Deactivated successfully. Jan 30 13:57:23.244175 systemd[1]: Started sshd@308-172.31.21.135:22-209.38.146.62:53764.service - OpenSSH per-connection server daemon (209.38.146.62:53764). Jan 30 13:57:23.377197 sshd[5083]: Invalid user debian from 209.38.146.62 port 53764 Jan 30 13:57:23.398059 sshd[5083]: Connection closed by invalid user debian 209.38.146.62 port 53764 [preauth] Jan 30 13:57:23.401117 systemd[1]: sshd@308-172.31.21.135:22-209.38.146.62:53764.service: Deactivated successfully. Jan 30 13:57:23.435495 systemd[1]: Started sshd@309-172.31.21.135:22-209.38.146.62:53766.service - OpenSSH per-connection server daemon (209.38.146.62:53766). Jan 30 13:57:23.550190 sshd[5088]: Invalid user debian from 209.38.146.62 port 53766 Jan 30 13:57:23.571036 sshd[5088]: Connection closed by invalid user debian 209.38.146.62 port 53766 [preauth] Jan 30 13:57:23.573345 systemd[1]: sshd@309-172.31.21.135:22-209.38.146.62:53766.service: Deactivated successfully. Jan 30 13:57:23.606107 systemd[1]: Started sshd@310-172.31.21.135:22-209.38.146.62:53770.service - OpenSSH per-connection server daemon (209.38.146.62:53770). Jan 30 13:57:23.722900 sshd[5093]: Invalid user debian from 209.38.146.62 port 53770 Jan 30 13:57:23.743916 sshd[5093]: Connection closed by invalid user debian 209.38.146.62 port 53770 [preauth] Jan 30 13:57:23.746254 systemd[1]: sshd@310-172.31.21.135:22-209.38.146.62:53770.service: Deactivated successfully. Jan 30 13:57:23.779072 systemd[1]: Started sshd@311-172.31.21.135:22-209.38.146.62:53776.service - OpenSSH per-connection server daemon (209.38.146.62:53776). Jan 30 13:57:23.897011 sshd[5098]: Invalid user debian from 209.38.146.62 port 53776 Jan 30 13:57:23.917499 sshd[5098]: Connection closed by invalid user debian 209.38.146.62 port 53776 [preauth] Jan 30 13:57:23.919905 systemd[1]: sshd@311-172.31.21.135:22-209.38.146.62:53776.service: Deactivated successfully. Jan 30 13:57:23.948882 systemd[1]: Started sshd@312-172.31.21.135:22-209.38.146.62:53788.service - OpenSSH per-connection server daemon (209.38.146.62:53788). Jan 30 13:57:24.089173 sshd[5103]: Invalid user debian from 209.38.146.62 port 53788 Jan 30 13:57:24.109522 sshd[5103]: Connection closed by invalid user debian 209.38.146.62 port 53788 [preauth] Jan 30 13:57:24.111803 systemd[1]: sshd@312-172.31.21.135:22-209.38.146.62:53788.service: Deactivated successfully. Jan 30 13:57:24.163772 systemd[1]: Started sshd@313-172.31.21.135:22-209.38.146.62:53800.service - OpenSSH per-connection server daemon (209.38.146.62:53800). Jan 30 13:57:24.289885 sshd[5108]: Invalid user debian from 209.38.146.62 port 53800 Jan 30 13:57:24.311000 sshd[5108]: Connection closed by invalid user debian 209.38.146.62 port 53800 [preauth] Jan 30 13:57:24.317775 systemd[1]: sshd@313-172.31.21.135:22-209.38.146.62:53800.service: Deactivated successfully. Jan 30 13:57:24.355095 systemd[1]: Started sshd@314-172.31.21.135:22-209.38.146.62:53812.service - OpenSSH per-connection server daemon (209.38.146.62:53812). Jan 30 13:57:24.487651 sshd[5113]: Invalid user debian from 209.38.146.62 port 53812 Jan 30 13:57:24.508500 sshd[5113]: Connection closed by invalid user debian 209.38.146.62 port 53812 [preauth] Jan 30 13:57:24.511008 systemd[1]: sshd@314-172.31.21.135:22-209.38.146.62:53812.service: Deactivated successfully. Jan 30 13:57:24.558160 systemd[1]: Started sshd@315-172.31.21.135:22-209.38.146.62:53822.service - OpenSSH per-connection server daemon (209.38.146.62:53822). Jan 30 13:57:24.658104 sshd[5118]: Invalid user debian from 209.38.146.62 port 53822 Jan 30 13:57:24.685292 sshd[5118]: Connection closed by invalid user debian 209.38.146.62 port 53822 [preauth] Jan 30 13:57:24.687794 systemd[1]: sshd@315-172.31.21.135:22-209.38.146.62:53822.service: Deactivated successfully. Jan 30 13:57:24.728100 systemd[1]: Started sshd@316-172.31.21.135:22-209.38.146.62:53832.service - OpenSSH per-connection server daemon (209.38.146.62:53832). Jan 30 13:57:24.862151 sshd[5123]: Invalid user debian from 209.38.146.62 port 53832 Jan 30 13:57:24.882607 sshd[5123]: Connection closed by invalid user debian 209.38.146.62 port 53832 [preauth] Jan 30 13:57:24.884941 systemd[1]: sshd@316-172.31.21.135:22-209.38.146.62:53832.service: Deactivated successfully. Jan 30 13:57:24.929554 systemd[1]: Started sshd@317-172.31.21.135:22-209.38.146.62:53836.service - OpenSSH per-connection server daemon (209.38.146.62:53836). Jan 30 13:57:25.051504 sshd[5128]: Invalid user debian from 209.38.146.62 port 53836 Jan 30 13:57:25.072679 sshd[5128]: Connection closed by invalid user debian 209.38.146.62 port 53836 [preauth] Jan 30 13:57:25.075254 systemd[1]: sshd@317-172.31.21.135:22-209.38.146.62:53836.service: Deactivated successfully. Jan 30 13:57:25.112107 systemd[1]: Started sshd@318-172.31.21.135:22-209.38.146.62:53840.service - OpenSSH per-connection server daemon (209.38.146.62:53840). Jan 30 13:57:25.212474 sshd[5133]: Invalid user debian from 209.38.146.62 port 53840 Jan 30 13:57:25.232876 sshd[5133]: Connection closed by invalid user debian 209.38.146.62 port 53840 [preauth] Jan 30 13:57:25.235181 systemd[1]: sshd@318-172.31.21.135:22-209.38.146.62:53840.service: Deactivated successfully. Jan 30 13:57:25.268221 systemd[1]: Started sshd@319-172.31.21.135:22-209.38.146.62:53856.service - OpenSSH per-connection server daemon (209.38.146.62:53856). Jan 30 13:57:25.376675 sshd[5138]: Invalid user debian from 209.38.146.62 port 53856 Jan 30 13:57:25.397608 sshd[5138]: Connection closed by invalid user debian 209.38.146.62 port 53856 [preauth] Jan 30 13:57:25.399943 systemd[1]: sshd@319-172.31.21.135:22-209.38.146.62:53856.service: Deactivated successfully. Jan 30 13:57:25.428054 systemd[1]: Started sshd@320-172.31.21.135:22-209.38.146.62:53868.service - OpenSSH per-connection server daemon (209.38.146.62:53868). Jan 30 13:57:25.540730 sshd[5149]: Invalid user debian from 209.38.146.62 port 53868 Jan 30 13:57:25.560917 sshd[5149]: Connection closed by invalid user debian 209.38.146.62 port 53868 [preauth] Jan 30 13:57:25.563404 systemd[1]: sshd@320-172.31.21.135:22-209.38.146.62:53868.service: Deactivated successfully. Jan 30 13:57:25.599106 systemd[1]: Started sshd@321-172.31.21.135:22-209.38.146.62:53880.service - OpenSSH per-connection server daemon (209.38.146.62:53880). Jan 30 13:57:25.698072 sshd[5154]: Invalid user debian from 209.38.146.62 port 53880 Jan 30 13:57:25.718643 sshd[5154]: Connection closed by invalid user debian 209.38.146.62 port 53880 [preauth] Jan 30 13:57:25.721440 systemd[1]: sshd@321-172.31.21.135:22-209.38.146.62:53880.service: Deactivated successfully. Jan 30 13:57:25.762108 systemd[1]: Started sshd@322-172.31.21.135:22-209.38.146.62:53892.service - OpenSSH per-connection server daemon (209.38.146.62:53892). Jan 30 13:57:25.911090 sshd[5159]: Invalid user debian from 209.38.146.62 port 53892 Jan 30 13:57:25.932280 sshd[5159]: Connection closed by invalid user debian 209.38.146.62 port 53892 [preauth] Jan 30 13:57:25.935624 systemd[1]: sshd@322-172.31.21.135:22-209.38.146.62:53892.service: Deactivated successfully. Jan 30 13:57:25.969009 systemd[1]: Started sshd@323-172.31.21.135:22-209.38.146.62:53900.service - OpenSSH per-connection server daemon (209.38.146.62:53900). Jan 30 13:57:26.106703 sshd[5164]: Invalid user debian from 209.38.146.62 port 53900 Jan 30 13:57:26.127311 sshd[5164]: Connection closed by invalid user debian 209.38.146.62 port 53900 [preauth] Jan 30 13:57:26.130021 systemd[1]: sshd@323-172.31.21.135:22-209.38.146.62:53900.service: Deactivated successfully. Jan 30 13:57:26.167100 systemd[1]: Started sshd@324-172.31.21.135:22-209.38.146.62:53910.service - OpenSSH per-connection server daemon (209.38.146.62:53910). Jan 30 13:57:26.296290 sshd[5169]: Invalid user debian from 209.38.146.62 port 53910 Jan 30 13:57:26.317586 sshd[5169]: Connection closed by invalid user debian 209.38.146.62 port 53910 [preauth] Jan 30 13:57:26.320015 systemd[1]: sshd@324-172.31.21.135:22-209.38.146.62:53910.service: Deactivated successfully. Jan 30 13:57:26.358472 systemd[1]: Started sshd@325-172.31.21.135:22-209.38.146.62:53924.service - OpenSSH per-connection server daemon (209.38.146.62:53924). Jan 30 13:57:26.470084 sshd[5174]: Invalid user debian from 209.38.146.62 port 53924 Jan 30 13:57:26.491189 sshd[5174]: Connection closed by invalid user debian 209.38.146.62 port 53924 [preauth] Jan 30 13:57:26.495124 systemd[1]: sshd@325-172.31.21.135:22-209.38.146.62:53924.service: Deactivated successfully. Jan 30 13:57:26.527088 systemd[1]: Started sshd@326-172.31.21.135:22-209.38.146.62:53928.service - OpenSSH per-connection server daemon (209.38.146.62:53928). Jan 30 13:57:26.640465 sshd[5179]: Invalid user debian from 209.38.146.62 port 53928 Jan 30 13:57:26.662334 sshd[5179]: Connection closed by invalid user debian 209.38.146.62 port 53928 [preauth] Jan 30 13:57:26.664740 systemd[1]: sshd@326-172.31.21.135:22-209.38.146.62:53928.service: Deactivated successfully. Jan 30 13:57:26.695055 systemd[1]: Started sshd@327-172.31.21.135:22-209.38.146.62:53932.service - OpenSSH per-connection server daemon (209.38.146.62:53932). Jan 30 13:57:26.794421 sshd[5184]: Invalid user debian from 209.38.146.62 port 53932 Jan 30 13:57:26.815232 sshd[5184]: Connection closed by invalid user debian 209.38.146.62 port 53932 [preauth] Jan 30 13:57:26.817888 systemd[1]: sshd@327-172.31.21.135:22-209.38.146.62:53932.service: Deactivated successfully. Jan 30 13:57:26.851063 systemd[1]: Started sshd@328-172.31.21.135:22-209.38.146.62:53944.service - OpenSSH per-connection server daemon (209.38.146.62:53944). Jan 30 13:57:26.971027 sshd[5189]: Invalid user debian from 209.38.146.62 port 53944 Jan 30 13:57:26.991322 sshd[5189]: Connection closed by invalid user debian 209.38.146.62 port 53944 [preauth] Jan 30 13:57:26.995363 systemd[1]: sshd@328-172.31.21.135:22-209.38.146.62:53944.service: Deactivated successfully. Jan 30 13:57:27.028159 systemd[1]: Started sshd@329-172.31.21.135:22-209.38.146.62:53946.service - OpenSSH per-connection server daemon (209.38.146.62:53946). Jan 30 13:57:27.129083 sshd[5194]: Invalid user debian from 209.38.146.62 port 53946 Jan 30 13:57:27.150479 sshd[5194]: Connection closed by invalid user debian 209.38.146.62 port 53946 [preauth] Jan 30 13:57:27.153020 systemd[1]: sshd@329-172.31.21.135:22-209.38.146.62:53946.service: Deactivated successfully. Jan 30 13:57:27.197064 systemd[1]: Started sshd@330-172.31.21.135:22-209.38.146.62:59098.service - OpenSSH per-connection server daemon (209.38.146.62:59098). Jan 30 13:57:27.308784 sshd[5199]: Invalid user debian from 209.38.146.62 port 59098 Jan 30 13:57:27.329373 sshd[5199]: Connection closed by invalid user debian 209.38.146.62 port 59098 [preauth] Jan 30 13:57:27.332485 systemd[1]: sshd@330-172.31.21.135:22-209.38.146.62:59098.service: Deactivated successfully. Jan 30 13:57:27.365039 systemd[1]: Started sshd@331-172.31.21.135:22-209.38.146.62:59110.service - OpenSSH per-connection server daemon (209.38.146.62:59110). Jan 30 13:57:27.462341 sshd[5204]: Invalid user debian from 209.38.146.62 port 59110 Jan 30 13:57:27.483159 sshd[5204]: Connection closed by invalid user debian 209.38.146.62 port 59110 [preauth] Jan 30 13:57:27.485595 systemd[1]: sshd@331-172.31.21.135:22-209.38.146.62:59110.service: Deactivated successfully. Jan 30 13:57:27.518052 systemd[1]: Started sshd@332-172.31.21.135:22-209.38.146.62:59116.service - OpenSSH per-connection server daemon (209.38.146.62:59116). Jan 30 13:57:27.629331 sshd[5209]: Invalid user debian from 209.38.146.62 port 59116 Jan 30 13:57:27.650063 sshd[5209]: Connection closed by invalid user debian 209.38.146.62 port 59116 [preauth] Jan 30 13:57:27.652614 systemd[1]: sshd@332-172.31.21.135:22-209.38.146.62:59116.service: Deactivated successfully. Jan 30 13:57:27.685233 systemd[1]: Started sshd@333-172.31.21.135:22-209.38.146.62:59120.service - OpenSSH per-connection server daemon (209.38.146.62:59120). Jan 30 13:57:27.787104 sshd[5214]: Invalid user debian from 209.38.146.62 port 59120 Jan 30 13:57:27.807846 sshd[5214]: Connection closed by invalid user debian 209.38.146.62 port 59120 [preauth] Jan 30 13:57:27.813860 systemd[1]: sshd@333-172.31.21.135:22-209.38.146.62:59120.service: Deactivated successfully. Jan 30 13:57:27.854425 systemd[1]: Started sshd@334-172.31.21.135:22-209.38.146.62:59122.service - OpenSSH per-connection server daemon (209.38.146.62:59122). Jan 30 13:57:27.958411 sshd[5219]: Invalid user debian from 209.38.146.62 port 59122 Jan 30 13:57:27.979033 sshd[5219]: Connection closed by invalid user debian 209.38.146.62 port 59122 [preauth] Jan 30 13:57:27.981516 systemd[1]: sshd@334-172.31.21.135:22-209.38.146.62:59122.service: Deactivated successfully. Jan 30 13:57:28.017444 systemd[1]: Started sshd@335-172.31.21.135:22-209.38.146.62:59132.service - OpenSSH per-connection server daemon (209.38.146.62:59132). Jan 30 13:57:28.129494 sshd[5224]: Invalid user debian from 209.38.146.62 port 59132 Jan 30 13:57:28.151194 sshd[5224]: Connection closed by invalid user debian 209.38.146.62 port 59132 [preauth] Jan 30 13:57:28.154080 systemd[1]: sshd@335-172.31.21.135:22-209.38.146.62:59132.service: Deactivated successfully. Jan 30 13:57:28.194730 systemd[1]: Started sshd@336-172.31.21.135:22-209.38.146.62:59136.service - OpenSSH per-connection server daemon (209.38.146.62:59136). Jan 30 13:57:28.313161 sshd[5229]: Invalid user debian from 209.38.146.62 port 59136 Jan 30 13:57:28.333847 sshd[5229]: Connection closed by invalid user debian 209.38.146.62 port 59136 [preauth] Jan 30 13:57:28.338172 systemd[1]: sshd@336-172.31.21.135:22-209.38.146.62:59136.service: Deactivated successfully. Jan 30 13:57:28.367559 systemd[1]: Started sshd@337-172.31.21.135:22-209.38.146.62:59152.service - OpenSSH per-connection server daemon (209.38.146.62:59152). Jan 30 13:57:28.483190 sshd[5234]: Invalid user debian from 209.38.146.62 port 59152 Jan 30 13:57:28.504185 sshd[5234]: Connection closed by invalid user debian 209.38.146.62 port 59152 [preauth] Jan 30 13:57:28.508485 systemd[1]: sshd@337-172.31.21.135:22-209.38.146.62:59152.service: Deactivated successfully. Jan 30 13:57:28.541080 systemd[1]: Started sshd@338-172.31.21.135:22-209.38.146.62:59166.service - OpenSSH per-connection server daemon (209.38.146.62:59166). Jan 30 13:57:28.650057 sshd[5239]: Invalid user debian from 209.38.146.62 port 59166 Jan 30 13:57:28.671203 sshd[5239]: Connection closed by invalid user debian 209.38.146.62 port 59166 [preauth] Jan 30 13:57:28.673940 systemd[1]: sshd@338-172.31.21.135:22-209.38.146.62:59166.service: Deactivated successfully. Jan 30 13:57:28.708498 systemd[1]: Started sshd@339-172.31.21.135:22-209.38.146.62:59168.service - OpenSSH per-connection server daemon (209.38.146.62:59168). Jan 30 13:57:28.816618 sshd[5244]: Invalid user debian from 209.38.146.62 port 59168 Jan 30 13:57:28.837407 sshd[5244]: Connection closed by invalid user debian 209.38.146.62 port 59168 [preauth] Jan 30 13:57:28.839880 systemd[1]: sshd@339-172.31.21.135:22-209.38.146.62:59168.service: Deactivated successfully. Jan 30 13:57:28.866761 systemd[1]: Started sshd@340-172.31.21.135:22-209.38.146.62:59180.service - OpenSSH per-connection server daemon (209.38.146.62:59180). Jan 30 13:57:28.989552 sshd[5249]: Invalid user debian from 209.38.146.62 port 59180 Jan 30 13:57:29.010322 sshd[5249]: Connection closed by invalid user debian 209.38.146.62 port 59180 [preauth] Jan 30 13:57:29.015299 systemd[1]: sshd@340-172.31.21.135:22-209.38.146.62:59180.service: Deactivated successfully. Jan 30 13:57:29.043098 systemd[1]: Started sshd@341-172.31.21.135:22-209.38.146.62:59184.service - OpenSSH per-connection server daemon (209.38.146.62:59184). Jan 30 13:57:29.147981 sshd[5254]: Invalid user debian from 209.38.146.62 port 59184 Jan 30 13:57:29.168866 sshd[5254]: Connection closed by invalid user debian 209.38.146.62 port 59184 [preauth] Jan 30 13:57:29.171337 systemd[1]: sshd@341-172.31.21.135:22-209.38.146.62:59184.service: Deactivated successfully. Jan 30 13:57:29.203941 systemd[1]: Started sshd@342-172.31.21.135:22-209.38.146.62:59200.service - OpenSSH per-connection server daemon (209.38.146.62:59200). Jan 30 13:57:29.319902 sshd[5259]: Invalid user debian from 209.38.146.62 port 59200 Jan 30 13:57:29.340749 sshd[5259]: Connection closed by invalid user debian 209.38.146.62 port 59200 [preauth] Jan 30 13:57:29.343498 systemd[1]: sshd@342-172.31.21.135:22-209.38.146.62:59200.service: Deactivated successfully. Jan 30 13:57:29.377168 systemd[1]: Started sshd@343-172.31.21.135:22-209.38.146.62:59216.service - OpenSSH per-connection server daemon (209.38.146.62:59216). Jan 30 13:57:29.481178 sshd[5264]: Invalid user debian from 209.38.146.62 port 59216 Jan 30 13:57:29.502208 sshd[5264]: Connection closed by invalid user debian 209.38.146.62 port 59216 [preauth] Jan 30 13:57:29.504768 systemd[1]: sshd@343-172.31.21.135:22-209.38.146.62:59216.service: Deactivated successfully. Jan 30 13:57:29.537076 systemd[1]: Started sshd@344-172.31.21.135:22-209.38.146.62:59228.service - OpenSSH per-connection server daemon (209.38.146.62:59228). Jan 30 13:57:29.637562 sshd[5269]: Invalid user debian from 209.38.146.62 port 59228 Jan 30 13:57:29.657875 sshd[5269]: Connection closed by invalid user debian 209.38.146.62 port 59228 [preauth] Jan 30 13:57:29.660659 systemd[1]: sshd@344-172.31.21.135:22-209.38.146.62:59228.service: Deactivated successfully. Jan 30 13:57:29.699572 systemd[1]: Started sshd@345-172.31.21.135:22-209.38.146.62:59242.service - OpenSSH per-connection server daemon (209.38.146.62:59242). Jan 30 13:57:29.815841 sshd[5274]: Invalid user debian from 209.38.146.62 port 59242 Jan 30 13:57:29.838537 sshd[5274]: Connection closed by invalid user debian 209.38.146.62 port 59242 [preauth] Jan 30 13:57:29.846563 systemd[1]: sshd@345-172.31.21.135:22-209.38.146.62:59242.service: Deactivated successfully. Jan 30 13:57:29.878316 systemd[1]: Started sshd@346-172.31.21.135:22-209.38.146.62:59246.service - OpenSSH per-connection server daemon (209.38.146.62:59246). Jan 30 13:57:30.013715 sshd[5279]: Invalid user debian from 209.38.146.62 port 59246 Jan 30 13:57:30.034837 sshd[5279]: Connection closed by invalid user debian 209.38.146.62 port 59246 [preauth] Jan 30 13:57:30.038065 systemd[1]: sshd@346-172.31.21.135:22-209.38.146.62:59246.service: Deactivated successfully. Jan 30 13:57:30.077280 systemd[1]: Started sshd@347-172.31.21.135:22-209.38.146.62:59250.service - OpenSSH per-connection server daemon (209.38.146.62:59250). Jan 30 13:57:30.188567 sshd[5284]: Invalid user debian from 209.38.146.62 port 59250 Jan 30 13:57:30.210754 sshd[5284]: Connection closed by invalid user debian 209.38.146.62 port 59250 [preauth] Jan 30 13:57:30.214200 systemd[1]: sshd@347-172.31.21.135:22-209.38.146.62:59250.service: Deactivated successfully. Jan 30 13:57:30.254117 systemd[1]: Started sshd@348-172.31.21.135:22-209.38.146.62:59260.service - OpenSSH per-connection server daemon (209.38.146.62:59260). Jan 30 13:57:30.403058 sshd[5289]: Invalid user debian from 209.38.146.62 port 59260 Jan 30 13:57:30.430659 sshd[5289]: Connection closed by invalid user debian 209.38.146.62 port 59260 [preauth] Jan 30 13:57:30.442494 systemd[1]: sshd@348-172.31.21.135:22-209.38.146.62:59260.service: Deactivated successfully. Jan 30 13:57:30.486147 systemd[1]: Started sshd@349-172.31.21.135:22-209.38.146.62:59268.service - OpenSSH per-connection server daemon (209.38.146.62:59268). Jan 30 13:57:30.590901 sshd[5300]: Invalid user debian from 209.38.146.62 port 59268 Jan 30 13:57:30.612080 sshd[5300]: Connection closed by invalid user debian 209.38.146.62 port 59268 [preauth] Jan 30 13:57:30.614804 systemd[1]: sshd@349-172.31.21.135:22-209.38.146.62:59268.service: Deactivated successfully. Jan 30 13:57:30.663618 systemd[1]: Started sshd@350-172.31.21.135:22-209.38.146.62:59276.service - OpenSSH per-connection server daemon (209.38.146.62:59276). Jan 30 13:57:30.809362 sshd[5305]: Invalid user debian from 209.38.146.62 port 59276 Jan 30 13:57:30.831082 sshd[5305]: Connection closed by invalid user debian 209.38.146.62 port 59276 [preauth] Jan 30 13:57:30.835461 systemd[1]: sshd@350-172.31.21.135:22-209.38.146.62:59276.service: Deactivated successfully. Jan 30 13:57:30.862489 systemd[1]: Started sshd@351-172.31.21.135:22-209.38.146.62:59278.service - OpenSSH per-connection server daemon (209.38.146.62:59278). Jan 30 13:57:30.998130 sshd[5310]: Invalid user debian from 209.38.146.62 port 59278 Jan 30 13:57:31.019437 sshd[5310]: Connection closed by invalid user debian 209.38.146.62 port 59278 [preauth] Jan 30 13:57:31.022366 systemd[1]: sshd@351-172.31.21.135:22-209.38.146.62:59278.service: Deactivated successfully. Jan 30 13:57:31.058233 systemd[1]: Started sshd@352-172.31.21.135:22-209.38.146.62:59292.service - OpenSSH per-connection server daemon (209.38.146.62:59292). Jan 30 13:57:31.194942 sshd[5315]: Invalid user debian from 209.38.146.62 port 59292 Jan 30 13:57:31.217821 sshd[5315]: Connection closed by invalid user debian 209.38.146.62 port 59292 [preauth] Jan 30 13:57:31.224455 systemd[1]: sshd@352-172.31.21.135:22-209.38.146.62:59292.service: Deactivated successfully. Jan 30 13:57:31.262045 systemd[1]: Started sshd@353-172.31.21.135:22-209.38.146.62:59298.service - OpenSSH per-connection server daemon (209.38.146.62:59298). Jan 30 13:57:31.395621 sshd[5320]: Invalid user debian from 209.38.146.62 port 59298 Jan 30 13:57:31.417809 sshd[5320]: Connection closed by invalid user debian 209.38.146.62 port 59298 [preauth] Jan 30 13:57:31.421205 systemd[1]: sshd@353-172.31.21.135:22-209.38.146.62:59298.service: Deactivated successfully. Jan 30 13:57:31.456561 systemd[1]: Started sshd@354-172.31.21.135:22-209.38.146.62:59306.service - OpenSSH per-connection server daemon (209.38.146.62:59306). Jan 30 13:57:31.568456 sshd[5325]: Invalid user debian from 209.38.146.62 port 59306 Jan 30 13:57:31.589288 sshd[5325]: Connection closed by invalid user debian 209.38.146.62 port 59306 [preauth] Jan 30 13:57:31.591412 systemd[1]: sshd@354-172.31.21.135:22-209.38.146.62:59306.service: Deactivated successfully. Jan 30 13:57:31.631100 systemd[1]: Started sshd@355-172.31.21.135:22-209.38.146.62:59314.service - OpenSSH per-connection server daemon (209.38.146.62:59314). Jan 30 13:57:31.740224 sshd[5330]: Invalid user debian from 209.38.146.62 port 59314 Jan 30 13:57:31.761205 sshd[5330]: Connection closed by invalid user debian 209.38.146.62 port 59314 [preauth] Jan 30 13:57:31.763825 systemd[1]: sshd@355-172.31.21.135:22-209.38.146.62:59314.service: Deactivated successfully. Jan 30 13:57:31.807118 systemd[1]: Started sshd@356-172.31.21.135:22-209.38.146.62:59324.service - OpenSSH per-connection server daemon (209.38.146.62:59324). Jan 30 13:57:31.928976 sshd[5335]: Invalid user debian from 209.38.146.62 port 59324 Jan 30 13:57:31.949503 sshd[5335]: Connection closed by invalid user debian 209.38.146.62 port 59324 [preauth] Jan 30 13:57:31.954769 systemd[1]: sshd@356-172.31.21.135:22-209.38.146.62:59324.service: Deactivated successfully. Jan 30 13:57:31.985213 systemd[1]: Started sshd@357-172.31.21.135:22-209.38.146.62:59334.service - OpenSSH per-connection server daemon (209.38.146.62:59334). Jan 30 13:57:32.093789 sshd[5340]: Invalid user debian from 209.38.146.62 port 59334 Jan 30 13:57:32.114847 sshd[5340]: Connection closed by invalid user debian 209.38.146.62 port 59334 [preauth] Jan 30 13:57:32.120018 systemd[1]: sshd@357-172.31.21.135:22-209.38.146.62:59334.service: Deactivated successfully. Jan 30 13:57:32.176172 systemd[1]: Started sshd@358-172.31.21.135:22-209.38.146.62:59348.service - OpenSSH per-connection server daemon (209.38.146.62:59348). Jan 30 13:57:32.307111 sshd[5345]: Invalid user debian from 209.38.146.62 port 59348 Jan 30 13:57:32.328309 sshd[5345]: Connection closed by invalid user debian 209.38.146.62 port 59348 [preauth] Jan 30 13:57:32.332355 systemd[1]: sshd@358-172.31.21.135:22-209.38.146.62:59348.service: Deactivated successfully. Jan 30 13:57:32.371143 systemd[1]: Started sshd@359-172.31.21.135:22-209.38.146.62:59350.service - OpenSSH per-connection server daemon (209.38.146.62:59350). Jan 30 13:57:32.490078 sshd[5350]: Invalid user debian from 209.38.146.62 port 59350 Jan 30 13:57:32.512715 sshd[5350]: Connection closed by invalid user debian 209.38.146.62 port 59350 [preauth] Jan 30 13:57:32.515183 systemd[1]: sshd@359-172.31.21.135:22-209.38.146.62:59350.service: Deactivated successfully. Jan 30 13:57:32.548279 systemd[1]: Started sshd@360-172.31.21.135:22-209.38.146.62:59354.service - OpenSSH per-connection server daemon (209.38.146.62:59354). Jan 30 13:57:32.669497 sshd[5355]: Invalid user debian from 209.38.146.62 port 59354 Jan 30 13:57:32.690655 sshd[5355]: Connection closed by invalid user debian 209.38.146.62 port 59354 [preauth] Jan 30 13:57:32.693825 systemd[1]: sshd@360-172.31.21.135:22-209.38.146.62:59354.service: Deactivated successfully. Jan 30 13:57:32.728107 systemd[1]: Started sshd@361-172.31.21.135:22-209.38.146.62:59366.service - OpenSSH per-connection server daemon (209.38.146.62:59366). Jan 30 13:57:32.835886 sshd[5360]: Invalid user debian from 209.38.146.62 port 59366 Jan 30 13:57:32.856505 sshd[5360]: Connection closed by invalid user debian 209.38.146.62 port 59366 [preauth] Jan 30 13:57:32.859965 systemd[1]: sshd@361-172.31.21.135:22-209.38.146.62:59366.service: Deactivated successfully. Jan 30 13:57:32.893165 systemd[1]: Started sshd@362-172.31.21.135:22-209.38.146.62:59370.service - OpenSSH per-connection server daemon (209.38.146.62:59370). Jan 30 13:57:32.995677 sshd[5365]: Invalid user admin from 209.38.146.62 port 59370 Jan 30 13:57:33.016833 sshd[5365]: Connection closed by invalid user admin 209.38.146.62 port 59370 [preauth] Jan 30 13:57:33.019668 systemd[1]: sshd@362-172.31.21.135:22-209.38.146.62:59370.service: Deactivated successfully. Jan 30 13:57:33.065814 systemd[1]: Started sshd@363-172.31.21.135:22-209.38.146.62:59378.service - OpenSSH per-connection server daemon (209.38.146.62:59378). Jan 30 13:57:33.228053 sshd[5370]: Invalid user admin from 209.38.146.62 port 59378 Jan 30 13:57:33.249510 sshd[5370]: Connection closed by invalid user admin 209.38.146.62 port 59378 [preauth] Jan 30 13:57:33.252111 systemd[1]: sshd@363-172.31.21.135:22-209.38.146.62:59378.service: Deactivated successfully. Jan 30 13:57:33.283172 systemd[1]: Started sshd@364-172.31.21.135:22-209.38.146.62:59388.service - OpenSSH per-connection server daemon (209.38.146.62:59388). Jan 30 13:57:33.398048 sshd[5375]: Invalid user admin from 209.38.146.62 port 59388 Jan 30 13:57:33.419440 sshd[5375]: Connection closed by invalid user admin 209.38.146.62 port 59388 [preauth] Jan 30 13:57:33.423022 systemd[1]: sshd@364-172.31.21.135:22-209.38.146.62:59388.service: Deactivated successfully. Jan 30 13:57:33.451299 systemd[1]: Started sshd@365-172.31.21.135:22-209.38.146.62:59404.service - OpenSSH per-connection server daemon (209.38.146.62:59404). Jan 30 13:57:33.562651 sshd[5380]: Invalid user admin from 209.38.146.62 port 59404 Jan 30 13:57:33.583798 sshd[5380]: Connection closed by invalid user admin 209.38.146.62 port 59404 [preauth] Jan 30 13:57:33.588047 systemd[1]: sshd@365-172.31.21.135:22-209.38.146.62:59404.service: Deactivated successfully. Jan 30 13:57:33.614127 systemd[1]: Started sshd@366-172.31.21.135:22-209.38.146.62:59416.service - OpenSSH per-connection server daemon (209.38.146.62:59416). Jan 30 13:57:33.728535 sshd[5385]: Invalid user admin from 209.38.146.62 port 59416 Jan 30 13:57:33.749965 sshd[5385]: Connection closed by invalid user admin 209.38.146.62 port 59416 [preauth] Jan 30 13:57:33.752586 systemd[1]: sshd@366-172.31.21.135:22-209.38.146.62:59416.service: Deactivated successfully. Jan 30 13:57:33.783715 systemd[1]: Started sshd@367-172.31.21.135:22-209.38.146.62:59420.service - OpenSSH per-connection server daemon (209.38.146.62:59420). Jan 30 13:57:33.899813 sshd[5390]: Invalid user admin from 209.38.146.62 port 59420 Jan 30 13:57:33.920468 sshd[5390]: Connection closed by invalid user admin 209.38.146.62 port 59420 [preauth] Jan 30 13:57:33.924230 systemd[1]: sshd@367-172.31.21.135:22-209.38.146.62:59420.service: Deactivated successfully. Jan 30 13:57:33.953086 systemd[1]: Started sshd@368-172.31.21.135:22-209.38.146.62:59422.service - OpenSSH per-connection server daemon (209.38.146.62:59422). Jan 30 13:57:34.072848 sshd[5395]: Invalid user admin from 209.38.146.62 port 59422 Jan 30 13:57:34.093271 sshd[5395]: Connection closed by invalid user admin 209.38.146.62 port 59422 [preauth] Jan 30 13:57:34.096311 systemd[1]: sshd@368-172.31.21.135:22-209.38.146.62:59422.service: Deactivated successfully. Jan 30 13:57:34.130110 systemd[1]: Started sshd@369-172.31.21.135:22-209.38.146.62:59438.service - OpenSSH per-connection server daemon (209.38.146.62:59438). Jan 30 13:57:34.243124 sshd[5400]: Invalid user admin from 209.38.146.62 port 59438 Jan 30 13:57:34.264337 sshd[5400]: Connection closed by invalid user admin 209.38.146.62 port 59438 [preauth] Jan 30 13:57:34.267657 systemd[1]: sshd@369-172.31.21.135:22-209.38.146.62:59438.service: Deactivated successfully. Jan 30 13:57:34.304199 systemd[1]: Started sshd@370-172.31.21.135:22-209.38.146.62:59444.service - OpenSSH per-connection server daemon (209.38.146.62:59444). Jan 30 13:57:34.434193 sshd[5405]: Invalid user admin from 209.38.146.62 port 59444 Jan 30 13:57:34.457054 sshd[5405]: Connection closed by invalid user admin 209.38.146.62 port 59444 [preauth] Jan 30 13:57:34.459461 systemd[1]: sshd@370-172.31.21.135:22-209.38.146.62:59444.service: Deactivated successfully. Jan 30 13:57:34.492091 systemd[1]: Started sshd@371-172.31.21.135:22-209.38.146.62:59448.service - OpenSSH per-connection server daemon (209.38.146.62:59448). Jan 30 13:57:34.610705 sshd[5410]: Invalid user admin from 209.38.146.62 port 59448 Jan 30 13:57:34.633623 sshd[5410]: Connection closed by invalid user admin 209.38.146.62 port 59448 [preauth] Jan 30 13:57:34.637772 systemd[1]: sshd@371-172.31.21.135:22-209.38.146.62:59448.service: Deactivated successfully. Jan 30 13:57:34.670108 systemd[1]: Started sshd@372-172.31.21.135:22-209.38.146.62:59464.service - OpenSSH per-connection server daemon (209.38.146.62:59464). Jan 30 13:57:34.784602 sshd[5415]: Invalid user admin from 209.38.146.62 port 59464 Jan 30 13:57:34.805710 sshd[5415]: Connection closed by invalid user admin 209.38.146.62 port 59464 [preauth] Jan 30 13:57:34.808075 systemd[1]: sshd@372-172.31.21.135:22-209.38.146.62:59464.service: Deactivated successfully. Jan 30 13:57:34.844449 systemd[1]: Started sshd@373-172.31.21.135:22-209.38.146.62:59470.service - OpenSSH per-connection server daemon (209.38.146.62:59470). Jan 30 13:57:34.956129 sshd[5420]: Invalid user admin from 209.38.146.62 port 59470 Jan 30 13:57:34.976593 sshd[5420]: Connection closed by invalid user admin 209.38.146.62 port 59470 [preauth] Jan 30 13:57:34.978906 systemd[1]: sshd@373-172.31.21.135:22-209.38.146.62:59470.service: Deactivated successfully. Jan 30 13:57:35.012147 systemd[1]: Started sshd@374-172.31.21.135:22-209.38.146.62:59480.service - OpenSSH per-connection server daemon (209.38.146.62:59480). Jan 30 13:57:35.122352 sshd[5425]: Invalid user admin from 209.38.146.62 port 59480 Jan 30 13:57:35.143007 sshd[5425]: Connection closed by invalid user admin 209.38.146.62 port 59480 [preauth] Jan 30 13:57:35.145707 systemd[1]: sshd@374-172.31.21.135:22-209.38.146.62:59480.service: Deactivated successfully. Jan 30 13:57:35.183234 systemd[1]: Started sshd@375-172.31.21.135:22-209.38.146.62:59482.service - OpenSSH per-connection server daemon (209.38.146.62:59482). Jan 30 13:57:35.326024 sshd[5430]: Invalid user admin from 209.38.146.62 port 59482 Jan 30 13:57:35.346891 sshd[5430]: Connection closed by invalid user admin 209.38.146.62 port 59482 [preauth] Jan 30 13:57:35.349263 systemd[1]: sshd@375-172.31.21.135:22-209.38.146.62:59482.service: Deactivated successfully. Jan 30 13:57:35.382095 systemd[1]: Started sshd@376-172.31.21.135:22-209.38.146.62:59490.service - OpenSSH per-connection server daemon (209.38.146.62:59490). Jan 30 13:57:35.483279 sshd[5435]: Invalid user admin from 209.38.146.62 port 59490 Jan 30 13:57:35.504359 sshd[5435]: Connection closed by invalid user admin 209.38.146.62 port 59490 [preauth] Jan 30 13:57:35.506918 systemd[1]: sshd@376-172.31.21.135:22-209.38.146.62:59490.service: Deactivated successfully. Jan 30 13:57:35.544598 systemd[1]: Started sshd@377-172.31.21.135:22-209.38.146.62:59494.service - OpenSSH per-connection server daemon (209.38.146.62:59494). Jan 30 13:57:35.667138 sshd[5446]: Invalid user admin from 209.38.146.62 port 59494 Jan 30 13:57:35.688556 sshd[5446]: Connection closed by invalid user admin 209.38.146.62 port 59494 [preauth] Jan 30 13:57:35.691458 systemd[1]: sshd@377-172.31.21.135:22-209.38.146.62:59494.service: Deactivated successfully. Jan 30 13:57:35.722437 systemd[1]: Started sshd@378-172.31.21.135:22-209.38.146.62:59500.service - OpenSSH per-connection server daemon (209.38.146.62:59500). Jan 30 13:57:35.831870 sshd[5451]: Invalid user admin from 209.38.146.62 port 59500 Jan 30 13:57:35.852333 sshd[5451]: Connection closed by invalid user admin 209.38.146.62 port 59500 [preauth] Jan 30 13:57:35.856093 systemd[1]: sshd@378-172.31.21.135:22-209.38.146.62:59500.service: Deactivated successfully. Jan 30 13:57:35.891369 systemd[1]: Started sshd@379-172.31.21.135:22-209.38.146.62:59516.service - OpenSSH per-connection server daemon (209.38.146.62:59516). Jan 30 13:57:36.005926 sshd[5456]: Invalid user admin from 209.38.146.62 port 59516 Jan 30 13:57:36.026524 sshd[5456]: Connection closed by invalid user admin 209.38.146.62 port 59516 [preauth] Jan 30 13:57:36.029207 systemd[1]: sshd@379-172.31.21.135:22-209.38.146.62:59516.service: Deactivated successfully. Jan 30 13:57:36.063442 systemd[1]: Started sshd@380-172.31.21.135:22-209.38.146.62:59520.service - OpenSSH per-connection server daemon (209.38.146.62:59520). Jan 30 13:57:36.163978 sshd[5461]: Invalid user admin from 209.38.146.62 port 59520 Jan 30 13:57:36.184965 sshd[5461]: Connection closed by invalid user admin 209.38.146.62 port 59520 [preauth] Jan 30 13:57:36.187733 systemd[1]: sshd@380-172.31.21.135:22-209.38.146.62:59520.service: Deactivated successfully. Jan 30 13:57:36.237102 systemd[1]: Started sshd@381-172.31.21.135:22-209.38.146.62:59532.service - OpenSSH per-connection server daemon (209.38.146.62:59532). Jan 30 13:57:36.354279 sshd[5466]: Invalid user admin from 209.38.146.62 port 59532 Jan 30 13:57:36.375649 sshd[5466]: Connection closed by invalid user admin 209.38.146.62 port 59532 [preauth] Jan 30 13:57:36.378781 systemd[1]: sshd@381-172.31.21.135:22-209.38.146.62:59532.service: Deactivated successfully. Jan 30 13:57:36.418217 systemd[1]: Started sshd@382-172.31.21.135:22-209.38.146.62:59540.service - OpenSSH per-connection server daemon (209.38.146.62:59540). Jan 30 13:57:36.529459 sshd[5471]: Invalid user admin from 209.38.146.62 port 59540 Jan 30 13:57:36.550589 sshd[5471]: Connection closed by invalid user admin 209.38.146.62 port 59540 [preauth] Jan 30 13:57:36.552966 systemd[1]: sshd@382-172.31.21.135:22-209.38.146.62:59540.service: Deactivated successfully. Jan 30 13:57:36.583321 systemd[1]: Started sshd@383-172.31.21.135:22-209.38.146.62:59544.service - OpenSSH per-connection server daemon (209.38.146.62:59544). Jan 30 13:57:36.690776 sshd[5476]: Invalid user admin from 209.38.146.62 port 59544 Jan 30 13:57:36.711180 sshd[5476]: Connection closed by invalid user admin 209.38.146.62 port 59544 [preauth] Jan 30 13:57:36.713575 systemd[1]: sshd@383-172.31.21.135:22-209.38.146.62:59544.service: Deactivated successfully. Jan 30 13:57:36.747171 systemd[1]: Started sshd@384-172.31.21.135:22-209.38.146.62:59556.service - OpenSSH per-connection server daemon (209.38.146.62:59556). Jan 30 13:57:36.866256 sshd[5481]: Invalid user admin from 209.38.146.62 port 59556 Jan 30 13:57:36.895056 sshd[5481]: Connection closed by invalid user admin 209.38.146.62 port 59556 [preauth] Jan 30 13:57:36.897973 systemd[1]: sshd@384-172.31.21.135:22-209.38.146.62:59556.service: Deactivated successfully. Jan 30 13:57:36.932361 systemd[1]: Started sshd@385-172.31.21.135:22-209.38.146.62:59558.service - OpenSSH per-connection server daemon (209.38.146.62:59558). Jan 30 13:57:37.045661 sshd[5486]: Invalid user admin from 209.38.146.62 port 59558 Jan 30 13:57:37.066662 sshd[5486]: Connection closed by invalid user admin 209.38.146.62 port 59558 [preauth] Jan 30 13:57:37.069142 systemd[1]: sshd@385-172.31.21.135:22-209.38.146.62:59558.service: Deactivated successfully. Jan 30 13:57:37.119208 systemd[1]: Started sshd@386-172.31.21.135:22-209.38.146.62:59728.service - OpenSSH per-connection server daemon (209.38.146.62:59728). Jan 30 13:57:37.243493 sshd[5491]: Invalid user admin from 209.38.146.62 port 59728 Jan 30 13:57:37.264370 sshd[5491]: Connection closed by invalid user admin 209.38.146.62 port 59728 [preauth] Jan 30 13:57:37.266681 systemd[1]: sshd@386-172.31.21.135:22-209.38.146.62:59728.service: Deactivated successfully. Jan 30 13:57:37.307099 systemd[1]: Started sshd@387-172.31.21.135:22-209.38.146.62:59738.service - OpenSSH per-connection server daemon (209.38.146.62:59738). Jan 30 13:57:37.422386 sshd[5496]: Invalid user admin from 209.38.146.62 port 59738 Jan 30 13:57:37.443740 sshd[5496]: Connection closed by invalid user admin 209.38.146.62 port 59738 [preauth] Jan 30 13:57:37.446207 systemd[1]: sshd@387-172.31.21.135:22-209.38.146.62:59738.service: Deactivated successfully. Jan 30 13:57:37.478066 systemd[1]: Started sshd@388-172.31.21.135:22-209.38.146.62:59752.service - OpenSSH per-connection server daemon (209.38.146.62:59752). Jan 30 13:57:37.586832 sshd[5501]: Invalid user admin from 209.38.146.62 port 59752 Jan 30 13:57:37.607721 sshd[5501]: Connection closed by invalid user admin 209.38.146.62 port 59752 [preauth] Jan 30 13:57:37.610672 systemd[1]: sshd@388-172.31.21.135:22-209.38.146.62:59752.service: Deactivated successfully. Jan 30 13:57:37.659085 systemd[1]: Started sshd@389-172.31.21.135:22-209.38.146.62:59760.service - OpenSSH per-connection server daemon (209.38.146.62:59760). Jan 30 13:57:37.769194 sshd[5506]: Invalid user admin from 209.38.146.62 port 59760 Jan 30 13:57:37.790026 sshd[5506]: Connection closed by invalid user admin 209.38.146.62 port 59760 [preauth] Jan 30 13:57:37.792514 systemd[1]: sshd@389-172.31.21.135:22-209.38.146.62:59760.service: Deactivated successfully. Jan 30 13:57:37.829117 systemd[1]: Started sshd@390-172.31.21.135:22-209.38.146.62:59772.service - OpenSSH per-connection server daemon (209.38.146.62:59772). Jan 30 13:57:37.929507 sshd[5511]: Invalid user admin from 209.38.146.62 port 59772 Jan 30 13:57:37.950627 sshd[5511]: Connection closed by invalid user admin 209.38.146.62 port 59772 [preauth] Jan 30 13:57:37.953682 systemd[1]: sshd@390-172.31.21.135:22-209.38.146.62:59772.service: Deactivated successfully. Jan 30 13:57:37.989137 systemd[1]: Started sshd@391-172.31.21.135:22-209.38.146.62:59774.service - OpenSSH per-connection server daemon (209.38.146.62:59774). Jan 30 13:57:38.092251 sshd[5516]: Invalid user admin from 209.38.146.62 port 59774 Jan 30 13:57:38.112857 sshd[5516]: Connection closed by invalid user admin 209.38.146.62 port 59774 [preauth] Jan 30 13:57:38.115576 systemd[1]: sshd@391-172.31.21.135:22-209.38.146.62:59774.service: Deactivated successfully. Jan 30 13:57:38.145866 systemd[1]: Started sshd@392-172.31.21.135:22-209.38.146.62:59788.service - OpenSSH per-connection server daemon (209.38.146.62:59788). Jan 30 13:57:38.264514 sshd[5521]: Invalid user admin from 209.38.146.62 port 59788 Jan 30 13:57:38.285719 sshd[5521]: Connection closed by invalid user admin 209.38.146.62 port 59788 [preauth] Jan 30 13:57:38.290829 systemd[1]: sshd@392-172.31.21.135:22-209.38.146.62:59788.service: Deactivated successfully. Jan 30 13:57:38.320127 systemd[1]: Started sshd@393-172.31.21.135:22-209.38.146.62:59804.service - OpenSSH per-connection server daemon (209.38.146.62:59804). Jan 30 13:57:38.436053 sshd[5526]: Invalid user admin from 209.38.146.62 port 59804 Jan 30 13:57:38.456727 sshd[5526]: Connection closed by invalid user admin 209.38.146.62 port 59804 [preauth] Jan 30 13:57:38.463189 systemd[1]: sshd@393-172.31.21.135:22-209.38.146.62:59804.service: Deactivated successfully. Jan 30 13:57:38.486313 systemd[1]: Started sshd@394-172.31.21.135:22-209.38.146.62:59808.service - OpenSSH per-connection server daemon (209.38.146.62:59808). Jan 30 13:57:38.591234 sshd[5531]: Invalid user admin from 209.38.146.62 port 59808 Jan 30 13:57:38.612177 sshd[5531]: Connection closed by invalid user admin 209.38.146.62 port 59808 [preauth] Jan 30 13:57:38.614869 systemd[1]: sshd@394-172.31.21.135:22-209.38.146.62:59808.service: Deactivated successfully. Jan 30 13:57:38.645624 systemd[1]: Started sshd@395-172.31.21.135:22-209.38.146.62:59814.service - OpenSSH per-connection server daemon (209.38.146.62:59814). Jan 30 13:57:38.770868 sshd[5536]: Invalid user admin from 209.38.146.62 port 59814 Jan 30 13:57:38.794943 sshd[5536]: Connection closed by invalid user admin 209.38.146.62 port 59814 [preauth] Jan 30 13:57:38.797824 systemd[1]: sshd@395-172.31.21.135:22-209.38.146.62:59814.service: Deactivated successfully. Jan 30 13:57:38.835125 systemd[1]: Started sshd@396-172.31.21.135:22-209.38.146.62:59822.service - OpenSSH per-connection server daemon (209.38.146.62:59822). Jan 30 13:57:38.932489 sshd[5541]: Invalid user admin from 209.38.146.62 port 59822 Jan 30 13:57:38.953250 sshd[5541]: Connection closed by invalid user admin 209.38.146.62 port 59822 [preauth] Jan 30 13:57:38.955749 systemd[1]: sshd@396-172.31.21.135:22-209.38.146.62:59822.service: Deactivated successfully. Jan 30 13:57:38.987088 systemd[1]: Started sshd@397-172.31.21.135:22-209.38.146.62:59828.service - OpenSSH per-connection server daemon (209.38.146.62:59828). Jan 30 13:57:39.087964 sshd[5546]: Invalid user admin from 209.38.146.62 port 59828 Jan 30 13:57:39.108887 sshd[5546]: Connection closed by invalid user admin 209.38.146.62 port 59828 [preauth] Jan 30 13:57:39.111608 systemd[1]: sshd@397-172.31.21.135:22-209.38.146.62:59828.service: Deactivated successfully. Jan 30 13:57:39.149098 systemd[1]: Started sshd@398-172.31.21.135:22-209.38.146.62:59836.service - OpenSSH per-connection server daemon (209.38.146.62:59836). Jan 30 13:57:39.285801 sshd[5551]: Invalid user admin from 209.38.146.62 port 59836 Jan 30 13:57:39.308115 sshd[5551]: Connection closed by invalid user admin 209.38.146.62 port 59836 [preauth] Jan 30 13:57:39.312891 systemd[1]: sshd@398-172.31.21.135:22-209.38.146.62:59836.service: Deactivated successfully. Jan 30 13:57:39.363119 systemd[1]: Started sshd@399-172.31.21.135:22-209.38.146.62:59846.service - OpenSSH per-connection server daemon (209.38.146.62:59846). Jan 30 13:57:39.466478 sshd[5556]: Invalid user admin from 209.38.146.62 port 59846 Jan 30 13:57:39.487944 sshd[5556]: Connection closed by invalid user admin 209.38.146.62 port 59846 [preauth] Jan 30 13:57:39.492729 systemd[1]: sshd@399-172.31.21.135:22-209.38.146.62:59846.service: Deactivated successfully. Jan 30 13:57:39.525102 systemd[1]: Started sshd@400-172.31.21.135:22-209.38.146.62:59852.service - OpenSSH per-connection server daemon (209.38.146.62:59852). Jan 30 13:57:39.648167 sshd[5561]: Invalid user admin from 209.38.146.62 port 59852 Jan 30 13:57:39.669529 sshd[5561]: Connection closed by invalid user admin 209.38.146.62 port 59852 [preauth] Jan 30 13:57:39.672114 systemd[1]: sshd@400-172.31.21.135:22-209.38.146.62:59852.service: Deactivated successfully. Jan 30 13:57:39.706074 systemd[1]: Started sshd@401-172.31.21.135:22-209.38.146.62:59864.service - OpenSSH per-connection server daemon (209.38.146.62:59864). Jan 30 13:57:39.820521 sshd[5566]: Invalid user admin from 209.38.146.62 port 59864 Jan 30 13:57:39.841128 sshd[5566]: Connection closed by invalid user admin 209.38.146.62 port 59864 [preauth] Jan 30 13:57:39.846727 systemd[1]: sshd@401-172.31.21.135:22-209.38.146.62:59864.service: Deactivated successfully. Jan 30 13:57:39.873270 systemd[1]: Started sshd@402-172.31.21.135:22-209.38.146.62:59868.service - OpenSSH per-connection server daemon (209.38.146.62:59868). Jan 30 13:57:39.997829 sshd[5571]: Invalid user admin from 209.38.146.62 port 59868 Jan 30 13:57:40.026322 sshd[5571]: Connection closed by invalid user admin 209.38.146.62 port 59868 [preauth] Jan 30 13:57:40.034449 systemd[1]: sshd@402-172.31.21.135:22-209.38.146.62:59868.service: Deactivated successfully. Jan 30 13:57:40.073138 systemd[1]: Started sshd@403-172.31.21.135:22-209.38.146.62:59876.service - OpenSSH per-connection server daemon (209.38.146.62:59876). Jan 30 13:57:40.207104 sshd[5576]: Invalid user admin from 209.38.146.62 port 59876 Jan 30 13:57:40.228480 sshd[5576]: Connection closed by invalid user admin 209.38.146.62 port 59876 [preauth] Jan 30 13:57:40.231410 systemd[1]: sshd@403-172.31.21.135:22-209.38.146.62:59876.service: Deactivated successfully. Jan 30 13:57:40.268680 systemd[1]: Started sshd@404-172.31.21.135:22-209.38.146.62:59886.service - OpenSSH per-connection server daemon (209.38.146.62:59886). Jan 30 13:57:40.385829 sshd[5581]: Invalid user admin from 209.38.146.62 port 59886 Jan 30 13:57:40.406742 sshd[5581]: Connection closed by invalid user admin 209.38.146.62 port 59886 [preauth] Jan 30 13:57:40.409743 systemd[1]: sshd@404-172.31.21.135:22-209.38.146.62:59886.service: Deactivated successfully. Jan 30 13:57:40.441221 systemd[1]: Started sshd@405-172.31.21.135:22-209.38.146.62:59896.service - OpenSSH per-connection server daemon (209.38.146.62:59896). Jan 30 13:57:40.554655 sshd[5588]: Invalid user admin from 209.38.146.62 port 59896 Jan 30 13:57:40.580577 sshd[5588]: Connection closed by invalid user admin 209.38.146.62 port 59896 [preauth] Jan 30 13:57:40.583279 systemd[1]: sshd@405-172.31.21.135:22-209.38.146.62:59896.service: Deactivated successfully. Jan 30 13:57:40.617214 systemd[1]: Started sshd@406-172.31.21.135:22-209.38.146.62:59902.service - OpenSSH per-connection server daemon (209.38.146.62:59902). Jan 30 13:57:40.716015 sshd[5597]: Invalid user admin from 209.38.146.62 port 59902 Jan 30 13:57:40.736390 sshd[5597]: Connection closed by invalid user admin 209.38.146.62 port 59902 [preauth] Jan 30 13:57:40.738885 systemd[1]: sshd@406-172.31.21.135:22-209.38.146.62:59902.service: Deactivated successfully. Jan 30 13:57:40.771073 systemd[1]: Started sshd@407-172.31.21.135:22-209.38.146.62:59912.service - OpenSSH per-connection server daemon (209.38.146.62:59912). Jan 30 13:57:40.877979 sshd[5602]: Invalid user admin from 209.38.146.62 port 59912 Jan 30 13:57:40.898905 sshd[5602]: Connection closed by invalid user admin 209.38.146.62 port 59912 [preauth] Jan 30 13:57:40.901573 systemd[1]: sshd@407-172.31.21.135:22-209.38.146.62:59912.service: Deactivated successfully. Jan 30 13:57:40.947105 systemd[1]: Started sshd@408-172.31.21.135:22-209.38.146.62:59916.service - OpenSSH per-connection server daemon (209.38.146.62:59916). Jan 30 13:57:41.074991 sshd[5608]: Invalid user admin from 209.38.146.62 port 59916 Jan 30 13:57:41.095935 sshd[5608]: Connection closed by invalid user admin 209.38.146.62 port 59916 [preauth] Jan 30 13:57:41.100552 systemd[1]: sshd@408-172.31.21.135:22-209.38.146.62:59916.service: Deactivated successfully. Jan 30 13:57:41.145137 systemd[1]: Started sshd@409-172.31.21.135:22-209.38.146.62:59920.service - OpenSSH per-connection server daemon (209.38.146.62:59920). Jan 30 13:57:41.272114 sshd[5613]: Invalid user admin from 209.38.146.62 port 59920 Jan 30 13:57:41.294771 sshd[5613]: Connection closed by invalid user admin 209.38.146.62 port 59920 [preauth] Jan 30 13:57:41.297822 systemd[1]: sshd@409-172.31.21.135:22-209.38.146.62:59920.service: Deactivated successfully. Jan 30 13:57:41.337168 systemd[1]: Started sshd@410-172.31.21.135:22-209.38.146.62:59932.service - OpenSSH per-connection server daemon (209.38.146.62:59932). Jan 30 13:57:41.461212 sshd[5619]: Invalid user admin from 209.38.146.62 port 59932 Jan 30 13:57:41.483591 sshd[5619]: Connection closed by invalid user admin 209.38.146.62 port 59932 [preauth] Jan 30 13:57:41.486907 systemd[1]: sshd@410-172.31.21.135:22-209.38.146.62:59932.service: Deactivated successfully. Jan 30 13:57:41.522931 systemd[1]: Started sshd@411-172.31.21.135:22-209.38.146.62:59934.service - OpenSSH per-connection server daemon (209.38.146.62:59934). Jan 30 13:57:41.684099 sshd[5624]: Invalid user admin from 209.38.146.62 port 59934 Jan 30 13:57:41.712522 sshd[5624]: Connection closed by invalid user admin 209.38.146.62 port 59934 [preauth] Jan 30 13:57:41.719397 systemd[1]: sshd@411-172.31.21.135:22-209.38.146.62:59934.service: Deactivated successfully. Jan 30 13:57:41.748637 systemd[1]: Started sshd@412-172.31.21.135:22-209.38.146.62:59948.service - OpenSSH per-connection server daemon (209.38.146.62:59948). Jan 30 13:57:41.870655 sshd[5630]: Invalid user admin from 209.38.146.62 port 59948 Jan 30 13:57:41.891244 sshd[5630]: Connection closed by invalid user admin 209.38.146.62 port 59948 [preauth] Jan 30 13:57:41.894551 systemd[1]: sshd@412-172.31.21.135:22-209.38.146.62:59948.service: Deactivated successfully. Jan 30 13:57:41.939520 systemd[1]: Started sshd@413-172.31.21.135:22-209.38.146.62:59952.service - OpenSSH per-connection server daemon (209.38.146.62:59952). Jan 30 13:57:42.067736 sshd[5635]: Invalid user admin from 209.38.146.62 port 59952 Jan 30 13:57:42.088883 sshd[5635]: Connection closed by invalid user admin 209.38.146.62 port 59952 [preauth] Jan 30 13:57:42.092022 systemd[1]: sshd@413-172.31.21.135:22-209.38.146.62:59952.service: Deactivated successfully. Jan 30 13:57:42.124250 systemd[1]: Started sshd@414-172.31.21.135:22-209.38.146.62:59958.service - OpenSSH per-connection server daemon (209.38.146.62:59958). Jan 30 13:57:42.263390 sshd[5640]: Invalid user admin from 209.38.146.62 port 59958 Jan 30 13:57:42.284352 sshd[5640]: Connection closed by invalid user admin 209.38.146.62 port 59958 [preauth] Jan 30 13:57:42.286804 systemd[1]: sshd@414-172.31.21.135:22-209.38.146.62:59958.service: Deactivated successfully. Jan 30 13:57:42.322083 systemd[1]: Started sshd@415-172.31.21.135:22-209.38.146.62:59962.service - OpenSSH per-connection server daemon (209.38.146.62:59962). Jan 30 13:57:42.439752 sshd[5645]: Invalid user admin from 209.38.146.62 port 59962 Jan 30 13:57:42.462983 sshd[5645]: Connection closed by invalid user admin 209.38.146.62 port 59962 [preauth] Jan 30 13:57:42.465363 systemd[1]: sshd@415-172.31.21.135:22-209.38.146.62:59962.service: Deactivated successfully. Jan 30 13:57:42.503225 systemd[1]: Started sshd@416-172.31.21.135:22-209.38.146.62:59978.service - OpenSSH per-connection server daemon (209.38.146.62:59978). Jan 30 13:57:42.605380 sshd[5650]: Invalid user admin from 209.38.146.62 port 59978 Jan 30 13:57:42.627264 sshd[5650]: Connection closed by invalid user admin 209.38.146.62 port 59978 [preauth] Jan 30 13:57:42.629570 systemd[1]: sshd@416-172.31.21.135:22-209.38.146.62:59978.service: Deactivated successfully. Jan 30 13:57:42.661099 systemd[1]: Started sshd@417-172.31.21.135:22-209.38.146.62:59980.service - OpenSSH per-connection server daemon (209.38.146.62:59980). Jan 30 13:57:42.761528 sshd[5655]: Invalid user admin from 209.38.146.62 port 59980 Jan 30 13:57:42.787763 sshd[5655]: Connection closed by invalid user admin 209.38.146.62 port 59980 [preauth] Jan 30 13:57:42.790937 systemd[1]: sshd@417-172.31.21.135:22-209.38.146.62:59980.service: Deactivated successfully. Jan 30 13:57:42.818974 systemd[1]: Started sshd@418-172.31.21.135:22-209.38.146.62:59996.service - OpenSSH per-connection server daemon (209.38.146.62:59996). Jan 30 13:57:42.941276 sshd[5660]: Invalid user admin from 209.38.146.62 port 59996 Jan 30 13:57:42.962310 sshd[5660]: Connection closed by invalid user admin 209.38.146.62 port 59996 [preauth] Jan 30 13:57:42.968110 systemd[1]: sshd@418-172.31.21.135:22-209.38.146.62:59996.service: Deactivated successfully. Jan 30 13:57:43.002099 systemd[1]: Started sshd@419-172.31.21.135:22-209.38.146.62:60010.service - OpenSSH per-connection server daemon (209.38.146.62:60010). Jan 30 13:57:43.108887 sshd[5665]: Invalid user admin from 209.38.146.62 port 60010 Jan 30 13:57:43.130055 sshd[5665]: Connection closed by invalid user admin 209.38.146.62 port 60010 [preauth] Jan 30 13:57:43.132987 systemd[1]: sshd@419-172.31.21.135:22-209.38.146.62:60010.service: Deactivated successfully. Jan 30 13:57:43.172090 systemd[1]: Started sshd@420-172.31.21.135:22-209.38.146.62:60012.service - OpenSSH per-connection server daemon (209.38.146.62:60012). Jan 30 13:57:43.281027 sshd[5670]: Invalid user admin from 209.38.146.62 port 60012 Jan 30 13:57:43.301742 sshd[5670]: Connection closed by invalid user admin 209.38.146.62 port 60012 [preauth] Jan 30 13:57:43.304359 systemd[1]: sshd@420-172.31.21.135:22-209.38.146.62:60012.service: Deactivated successfully. Jan 30 13:57:43.343281 systemd[1]: Started sshd@421-172.31.21.135:22-209.38.146.62:60014.service - OpenSSH per-connection server daemon (209.38.146.62:60014). Jan 30 13:57:43.458230 sshd[5675]: Invalid user admin from 209.38.146.62 port 60014 Jan 30 13:57:43.479838 sshd[5675]: Connection closed by invalid user admin 209.38.146.62 port 60014 [preauth] Jan 30 13:57:43.482158 systemd[1]: sshd@421-172.31.21.135:22-209.38.146.62:60014.service: Deactivated successfully. Jan 30 13:57:43.513123 systemd[1]: Started sshd@422-172.31.21.135:22-209.38.146.62:60030.service - OpenSSH per-connection server daemon (209.38.146.62:60030). Jan 30 13:57:43.615909 sshd[5680]: Invalid user admin from 209.38.146.62 port 60030 Jan 30 13:57:43.636576 sshd[5680]: Connection closed by invalid user admin 209.38.146.62 port 60030 [preauth] Jan 30 13:57:43.638961 systemd[1]: sshd@422-172.31.21.135:22-209.38.146.62:60030.service: Deactivated successfully. Jan 30 13:57:43.675054 systemd[1]: Started sshd@423-172.31.21.135:22-209.38.146.62:60038.service - OpenSSH per-connection server daemon (209.38.146.62:60038). Jan 30 13:57:43.773856 sshd[5685]: Invalid user admin from 209.38.146.62 port 60038 Jan 30 13:57:43.794853 sshd[5685]: Connection closed by invalid user admin 209.38.146.62 port 60038 [preauth] Jan 30 13:57:43.797195 systemd[1]: sshd@423-172.31.21.135:22-209.38.146.62:60038.service: Deactivated successfully. Jan 30 13:57:43.829272 systemd[1]: Started sshd@424-172.31.21.135:22-209.38.146.62:60042.service - OpenSSH per-connection server daemon (209.38.146.62:60042). Jan 30 13:57:43.938594 sshd[5690]: Invalid user admin from 209.38.146.62 port 60042 Jan 30 13:57:43.959727 sshd[5690]: Connection closed by invalid user admin 209.38.146.62 port 60042 [preauth] Jan 30 13:57:43.962182 systemd[1]: sshd@424-172.31.21.135:22-209.38.146.62:60042.service: Deactivated successfully. Jan 30 13:57:43.993039 systemd[1]: Started sshd@425-172.31.21.135:22-209.38.146.62:60046.service - OpenSSH per-connection server daemon (209.38.146.62:60046). Jan 30 13:57:44.090039 sshd[5695]: Invalid user admin from 209.38.146.62 port 60046 Jan 30 13:57:44.110575 sshd[5695]: Connection closed by invalid user admin 209.38.146.62 port 60046 [preauth] Jan 30 13:57:44.114040 systemd[1]: sshd@425-172.31.21.135:22-209.38.146.62:60046.service: Deactivated successfully. Jan 30 13:57:44.141844 systemd[1]: Started sshd@426-172.31.21.135:22-209.38.146.62:60058.service - OpenSSH per-connection server daemon (209.38.146.62:60058). Jan 30 13:57:44.244011 sshd[5700]: Invalid user admin from 209.38.146.62 port 60058 Jan 30 13:57:44.264678 sshd[5700]: Connection closed by invalid user admin 209.38.146.62 port 60058 [preauth] Jan 30 13:57:44.267123 systemd[1]: sshd@426-172.31.21.135:22-209.38.146.62:60058.service: Deactivated successfully. Jan 30 13:57:44.294555 systemd[1]: Started sshd@427-172.31.21.135:22-209.38.146.62:60060.service - OpenSSH per-connection server daemon (209.38.146.62:60060). Jan 30 13:57:44.401263 sshd[5705]: Invalid user admin from 209.38.146.62 port 60060 Jan 30 13:57:44.421838 sshd[5705]: Connection closed by invalid user admin 209.38.146.62 port 60060 [preauth] Jan 30 13:57:44.425544 systemd[1]: sshd@427-172.31.21.135:22-209.38.146.62:60060.service: Deactivated successfully. Jan 30 13:57:44.457077 systemd[1]: Started sshd@428-172.31.21.135:22-209.38.146.62:60076.service - OpenSSH per-connection server daemon (209.38.146.62:60076). Jan 30 13:57:44.557012 sshd[5710]: Invalid user admin from 209.38.146.62 port 60076 Jan 30 13:57:44.578319 sshd[5710]: Connection closed by invalid user admin 209.38.146.62 port 60076 [preauth] Jan 30 13:57:44.583247 systemd[1]: sshd@428-172.31.21.135:22-209.38.146.62:60076.service: Deactivated successfully. Jan 30 13:57:44.616049 systemd[1]: Started sshd@429-172.31.21.135:22-209.38.146.62:60080.service - OpenSSH per-connection server daemon (209.38.146.62:60080). Jan 30 13:57:44.729977 sshd[5716]: Invalid user admin from 209.38.146.62 port 60080 Jan 30 13:57:44.751061 sshd[5716]: Connection closed by invalid user admin 209.38.146.62 port 60080 [preauth] Jan 30 13:57:44.753910 systemd[1]: sshd@429-172.31.21.135:22-209.38.146.62:60080.service: Deactivated successfully. Jan 30 13:57:44.788084 systemd[1]: Started sshd@430-172.31.21.135:22-209.38.146.62:60092.service - OpenSSH per-connection server daemon (209.38.146.62:60092). Jan 30 13:57:44.893753 sshd[5721]: Invalid user admin from 209.38.146.62 port 60092 Jan 30 13:57:44.918939 sshd[5721]: Connection closed by invalid user admin 209.38.146.62 port 60092 [preauth] Jan 30 13:57:44.928101 systemd[1]: sshd@430-172.31.21.135:22-209.38.146.62:60092.service: Deactivated successfully. Jan 30 13:57:44.956307 systemd[1]: Started sshd@431-172.31.21.135:22-209.38.146.62:60098.service - OpenSSH per-connection server daemon (209.38.146.62:60098). Jan 30 13:57:45.086970 sshd[5726]: Invalid user admin from 209.38.146.62 port 60098 Jan 30 13:57:45.108164 sshd[5726]: Connection closed by invalid user admin 209.38.146.62 port 60098 [preauth] Jan 30 13:57:45.110869 systemd[1]: sshd@431-172.31.21.135:22-209.38.146.62:60098.service: Deactivated successfully. Jan 30 13:57:45.143158 systemd[1]: Started sshd@432-172.31.21.135:22-209.38.146.62:60114.service - OpenSSH per-connection server daemon (209.38.146.62:60114). Jan 30 13:57:45.256656 sshd[5732]: Invalid user admin from 209.38.146.62 port 60114 Jan 30 13:57:45.277166 sshd[5732]: Connection closed by invalid user admin 209.38.146.62 port 60114 [preauth] Jan 30 13:57:45.281396 systemd[1]: sshd@432-172.31.21.135:22-209.38.146.62:60114.service: Deactivated successfully. Jan 30 13:57:45.312158 systemd[1]: Started sshd@433-172.31.21.135:22-209.38.146.62:60116.service - OpenSSH per-connection server daemon (209.38.146.62:60116). Jan 30 13:57:45.421127 sshd[5737]: Invalid user admin from 209.38.146.62 port 60116 Jan 30 13:57:45.441845 sshd[5737]: Connection closed by invalid user admin 209.38.146.62 port 60116 [preauth] Jan 30 13:57:45.444762 systemd[1]: sshd@433-172.31.21.135:22-209.38.146.62:60116.service: Deactivated successfully. Jan 30 13:57:45.487363 systemd[1]: Started sshd@434-172.31.21.135:22-209.38.146.62:60118.service - OpenSSH per-connection server daemon (209.38.146.62:60118). Jan 30 13:57:45.597080 sshd[5744]: Invalid user admin from 209.38.146.62 port 60118 Jan 30 13:57:45.618631 sshd[5744]: Connection closed by invalid user admin 209.38.146.62 port 60118 [preauth] Jan 30 13:57:45.621606 systemd[1]: sshd@434-172.31.21.135:22-209.38.146.62:60118.service: Deactivated successfully. Jan 30 13:57:45.655239 systemd[1]: Started sshd@435-172.31.21.135:22-209.38.146.62:60134.service - OpenSSH per-connection server daemon (209.38.146.62:60134). Jan 30 13:57:45.765400 sshd[5753]: Invalid user admin from 209.38.146.62 port 60134 Jan 30 13:57:45.786092 sshd[5753]: Connection closed by invalid user admin 209.38.146.62 port 60134 [preauth] Jan 30 13:57:45.789399 systemd[1]: sshd@435-172.31.21.135:22-209.38.146.62:60134.service: Deactivated successfully. Jan 30 13:57:45.825435 systemd[1]: Started sshd@436-172.31.21.135:22-209.38.146.62:60136.service - OpenSSH per-connection server daemon (209.38.146.62:60136). Jan 30 13:57:45.946817 sshd[5758]: Invalid user admin from 209.38.146.62 port 60136 Jan 30 13:57:45.967546 sshd[5758]: Connection closed by invalid user admin 209.38.146.62 port 60136 [preauth] Jan 30 13:57:45.970108 systemd[1]: sshd@436-172.31.21.135:22-209.38.146.62:60136.service: Deactivated successfully. Jan 30 13:57:46.001109 systemd[1]: Started sshd@437-172.31.21.135:22-209.38.146.62:60144.service - OpenSSH per-connection server daemon (209.38.146.62:60144). Jan 30 13:57:46.118960 sshd[5763]: Invalid user admin from 209.38.146.62 port 60144 Jan 30 13:57:46.139515 sshd[5763]: Connection closed by invalid user admin 209.38.146.62 port 60144 [preauth] Jan 30 13:57:46.143992 systemd[1]: sshd@437-172.31.21.135:22-209.38.146.62:60144.service: Deactivated successfully. Jan 30 13:57:46.175094 systemd[1]: Started sshd@438-172.31.21.135:22-209.38.146.62:60154.service - OpenSSH per-connection server daemon (209.38.146.62:60154). Jan 30 13:57:46.321193 sshd[5768]: Invalid user admin from 209.38.146.62 port 60154 Jan 30 13:57:46.341923 sshd[5768]: Connection closed by invalid user admin 209.38.146.62 port 60154 [preauth] Jan 30 13:57:46.344376 systemd[1]: sshd@438-172.31.21.135:22-209.38.146.62:60154.service: Deactivated successfully. Jan 30 13:57:46.376497 systemd[1]: Started sshd@439-172.31.21.135:22-209.38.146.62:60156.service - OpenSSH per-connection server daemon (209.38.146.62:60156). Jan 30 13:57:46.497585 sshd[5773]: Invalid user admin from 209.38.146.62 port 60156 Jan 30 13:57:46.541054 sshd[5773]: Connection closed by invalid user admin 209.38.146.62 port 60156 [preauth] Jan 30 13:57:46.544822 systemd[1]: sshd@439-172.31.21.135:22-209.38.146.62:60156.service: Deactivated successfully. Jan 30 13:57:46.578176 systemd[1]: Started sshd@440-172.31.21.135:22-209.38.146.62:60166.service - OpenSSH per-connection server daemon (209.38.146.62:60166). Jan 30 13:57:46.691387 sshd[5778]: Invalid user admin from 209.38.146.62 port 60166 Jan 30 13:57:46.712623 sshd[5778]: Connection closed by invalid user admin 209.38.146.62 port 60166 [preauth] Jan 30 13:57:46.715203 systemd[1]: sshd@440-172.31.21.135:22-209.38.146.62:60166.service: Deactivated successfully. Jan 30 13:57:46.759145 systemd[1]: Started sshd@441-172.31.21.135:22-209.38.146.62:60174.service - OpenSSH per-connection server daemon (209.38.146.62:60174). Jan 30 13:57:46.870337 sshd[5783]: Invalid user admin from 209.38.146.62 port 60174 Jan 30 13:57:46.891602 sshd[5783]: Connection closed by invalid user admin 209.38.146.62 port 60174 [preauth] Jan 30 13:57:46.894509 systemd[1]: sshd@441-172.31.21.135:22-209.38.146.62:60174.service: Deactivated successfully. Jan 30 13:57:46.928071 systemd[1]: Started sshd@442-172.31.21.135:22-209.38.146.62:60186.service - OpenSSH per-connection server daemon (209.38.146.62:60186). Jan 30 13:57:47.028207 sshd[5788]: Invalid user admin from 209.38.146.62 port 60186 Jan 30 13:57:47.049256 sshd[5788]: Connection closed by invalid user admin 209.38.146.62 port 60186 [preauth] Jan 30 13:57:47.052751 systemd[1]: sshd@442-172.31.21.135:22-209.38.146.62:60186.service: Deactivated successfully. Jan 30 13:57:47.103654 systemd[1]: Started sshd@443-172.31.21.135:22-209.38.146.62:41582.service - OpenSSH per-connection server daemon (209.38.146.62:41582). Jan 30 13:57:47.210816 sshd[5793]: Invalid user admin from 209.38.146.62 port 41582 Jan 30 13:57:47.232608 sshd[5793]: Connection closed by invalid user admin 209.38.146.62 port 41582 [preauth] Jan 30 13:57:47.237797 systemd[1]: sshd@443-172.31.21.135:22-209.38.146.62:41582.service: Deactivated successfully. Jan 30 13:57:47.272061 systemd[1]: Started sshd@444-172.31.21.135:22-209.38.146.62:41592.service - OpenSSH per-connection server daemon (209.38.146.62:41592). Jan 30 13:57:47.373448 sshd[5798]: Invalid user admin from 209.38.146.62 port 41592 Jan 30 13:57:47.394755 sshd[5798]: Connection closed by invalid user admin 209.38.146.62 port 41592 [preauth] Jan 30 13:57:47.398388 systemd[1]: sshd@444-172.31.21.135:22-209.38.146.62:41592.service: Deactivated successfully. Jan 30 13:57:47.429076 systemd[1]: Started sshd@445-172.31.21.135:22-209.38.146.62:41606.service - OpenSSH per-connection server daemon (209.38.146.62:41606). Jan 30 13:57:47.530522 sshd[5803]: Invalid user admin from 209.38.146.62 port 41606 Jan 30 13:57:47.555929 sshd[5803]: Connection closed by invalid user admin 209.38.146.62 port 41606 [preauth] Jan 30 13:57:47.558423 systemd[1]: sshd@445-172.31.21.135:22-209.38.146.62:41606.service: Deactivated successfully. Jan 30 13:57:47.594337 systemd[1]: Started sshd@446-172.31.21.135:22-209.38.146.62:41622.service - OpenSSH per-connection server daemon (209.38.146.62:41622). Jan 30 13:57:47.700922 sshd[5808]: Invalid user admin from 209.38.146.62 port 41622 Jan 30 13:57:47.721882 sshd[5808]: Connection closed by invalid user admin 209.38.146.62 port 41622 [preauth] Jan 30 13:57:47.724344 systemd[1]: sshd@446-172.31.21.135:22-209.38.146.62:41622.service: Deactivated successfully. Jan 30 13:57:47.756136 systemd[1]: Started sshd@447-172.31.21.135:22-209.38.146.62:41638.service - OpenSSH per-connection server daemon (209.38.146.62:41638). Jan 30 13:57:47.855734 sshd[5813]: Invalid user admin from 209.38.146.62 port 41638 Jan 30 13:57:47.876419 sshd[5813]: Connection closed by invalid user admin 209.38.146.62 port 41638 [preauth] Jan 30 13:57:47.879379 systemd[1]: sshd@447-172.31.21.135:22-209.38.146.62:41638.service: Deactivated successfully. Jan 30 13:57:47.912231 systemd[1]: Started sshd@448-172.31.21.135:22-209.38.146.62:41652.service - OpenSSH per-connection server daemon (209.38.146.62:41652). Jan 30 13:57:48.018629 sshd[5818]: Invalid user admin from 209.38.146.62 port 41652 Jan 30 13:57:48.039665 sshd[5818]: Connection closed by invalid user admin 209.38.146.62 port 41652 [preauth] Jan 30 13:57:48.042077 systemd[1]: sshd@448-172.31.21.135:22-209.38.146.62:41652.service: Deactivated successfully. Jan 30 13:57:48.087165 systemd[1]: Started sshd@449-172.31.21.135:22-209.38.146.62:41658.service - OpenSSH per-connection server daemon (209.38.146.62:41658). Jan 30 13:57:48.211449 sshd[5823]: Invalid user admin from 209.38.146.62 port 41658 Jan 30 13:57:48.233416 sshd[5823]: Connection closed by invalid user admin 209.38.146.62 port 41658 [preauth] Jan 30 13:57:48.236306 systemd[1]: sshd@449-172.31.21.135:22-209.38.146.62:41658.service: Deactivated successfully. Jan 30 13:57:48.272447 systemd[1]: Started sshd@450-172.31.21.135:22-209.38.146.62:41660.service - OpenSSH per-connection server daemon (209.38.146.62:41660). Jan 30 13:57:48.397379 sshd[5828]: Invalid user pi from 209.38.146.62 port 41660 Jan 30 13:57:48.417873 sshd[5828]: Connection closed by invalid user pi 209.38.146.62 port 41660 [preauth] Jan 30 13:57:48.421576 systemd[1]: sshd@450-172.31.21.135:22-209.38.146.62:41660.service: Deactivated successfully. Jan 30 13:57:48.452991 systemd[1]: Started sshd@451-172.31.21.135:22-209.38.146.62:41662.service - OpenSSH per-connection server daemon (209.38.146.62:41662). Jan 30 13:57:48.563952 sshd[5833]: Invalid user ftp from 209.38.146.62 port 41662 Jan 30 13:57:48.585248 sshd[5833]: Connection closed by invalid user ftp 209.38.146.62 port 41662 [preauth] Jan 30 13:57:48.588019 systemd[1]: sshd@451-172.31.21.135:22-209.38.146.62:41662.service: Deactivated successfully. Jan 30 13:58:14.659552 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:14.658Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a","error":"EOF"} Jan 30 13:58:14.659552 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:14.658Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a","error":"EOF"} Jan 30 13:58:14.690921 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:14.690Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"b1da9f7a3bcbf26a","error":"failed to dial b1da9f7a3bcbf26a on stream Message (peer b1da9f7a3bcbf26a failed to find local node 8afdd45dfef98e56)"} Jan 30 13:58:19.715179 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:19.714Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:58:19.716918 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:19.715Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"b1da9f7a3bcbf26a"} Jan 30 13:58:34.721777 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:34.721Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:34.721777 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:34.721Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:39.721764 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:39.721Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:39.721764 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:39.721Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:44.722536 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:44.722Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:44.722536 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:44.722Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:48.614768 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.613Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [term 5] received MsgTimeoutNow from d3302519065413e2 and starts an election to get leadership."} Jan 30 13:58:48.614768 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.613Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 5"} Jan 30 13:58:48.614768 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.613Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became candidate at term 6"} Jan 30 13:58:48.614768 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.613Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:48.614768 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.614Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 5, index: 316] sent MsgVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:48.614768 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.614Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 5, index: 316] sent MsgVote request to d3302519065413e2 at term 6"} Jan 30 13:58:48.614768 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.614Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8afdd45dfef98e56 lost leader d3302519065413e2 at term 6"} Jan 30 13:58:48.630411 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.622Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgVoteResp from d3302519065413e2 at term 6"} Jan 30 13:58:48.630411 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.622Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 has received 2 MsgVoteResp votes and 0 vote rejections"} Jan 30 13:58:48.630411 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.622Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became leader at term 6"} Jan 30 13:58:48.630411 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:48.622Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8afdd45dfef98e56 elected leader 8afdd45dfef98e56 at term 6"} Jan 30 13:58:48.715278 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:48.714Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2","error":"EOF"} Jan 30 13:58:48.715589 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:48.715Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2","error":"EOF"} Jan 30 13:58:48.720445 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:48.720Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"d3302519065413e2","error":"failed to dial d3302519065413e2 on stream Message (peer d3302519065413e2 failed to find local node 8afdd45dfef98e56)"} Jan 30 13:58:49.106076 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:49.105Z","caller":"rafthttp/stream.go:223","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:58:49.722833 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:49.722Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:49.722833 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:49.722Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:50.604880 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:50.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:85","msg":"8afdd45dfef98e56 stepped down to follower since quorum is not active"} Jan 30 13:58:50.604880 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:50.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became follower at term 6"} Jan 30 13:58:50.604880 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:50.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8afdd45dfef98e56 lost leader 8afdd45dfef98e56 at term 6"} Jan 30 13:58:50.631583 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:50.631Z","caller":"etcdserver/cluster_util.go:288","msg":"failed to reach the peer URL","address":"http://172.31.22.227:2380/version","remote-member-id":"b1da9f7a3bcbf26a","error":"Get \"http://172.31.22.227:2380/version\": dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:50.631583 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:50.631Z","caller":"etcdserver/cluster_util.go:155","msg":"failed to get version","remote-member-id":"b1da9f7a3bcbf26a","error":"Get \"http://172.31.22.227:2380/version\": dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:50.632078 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:50.631Z","caller":"etcdserver/cluster_util.go:288","msg":"failed to reach the peer URL","address":"http://172.31.18.87:2380/version","remote-member-id":"d3302519065413e2","error":"Get \"http://172.31.18.87:2380/version\": dial tcp 172.31.18.87:2380: connect: connection refused"} Jan 30 13:58:50.632078 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:50.631Z","caller":"etcdserver/cluster_util.go:155","msg":"failed to get version","remote-member-id":"d3302519065413e2","error":"Get \"http://172.31.18.87:2380/version\": dial tcp 172.31.18.87:2380: connect: connection refused"} Jan 30 13:58:51.605637 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:51.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:51.605637 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:51.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:51.605637 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:51.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:51.605637 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:51.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:51.605637 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:51.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:52.605393 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:52.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:52.605393 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:52.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:52.605393 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:52.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:52.605393 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:52.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:52.605393 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:52.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:53.049265 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:53.049Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"8afdd45dfef98e56","remote-peer-id":"d3302519065413e2"} Jan 30 13:58:53.605400 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:53.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:53.605400 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:53.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:53.605400 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:53.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:53.605400 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:53.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:53.605400 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:53.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:54.605389 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:54.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:54.605389 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:54.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:54.605389 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:54.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:54.605389 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:54.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:54.605389 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:54.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:54.723998 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:54.723Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:54.723998 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:54.723Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:55.605746 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:55.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:55.605746 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:55.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:55.605746 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:55.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:55.606327 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:55.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:55.606327 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:55.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:56.604960 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:56.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:56.604960 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:56.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:56.604960 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:56.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:56.605358 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:56.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:56.605358 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:56.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:57.605198 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:57.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:57.605198 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:57.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:57.605198 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:57.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:57.605912 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:57.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:57.605912 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:57.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:58.605486 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:58.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:58.605486 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:58.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:58.605486 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:58.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:58.605486 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:58.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:58.605486 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:58.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:59.605416 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:59.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:58:59.605416 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:59.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:58:59.605416 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:59.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:58:59.605416 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:59.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:58:59.605416 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:58:59.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:58:59.724734 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:59.724Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:58:59.724734 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:58:59.724Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:59:00.606137 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:00.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:00.606137 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:00.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:00.606137 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:00.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:00.606137 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:00.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:00.606137 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:00.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:01.605781 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:01.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:01.605781 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:01.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:01.605781 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:01.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:01.605781 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:01.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:01.605781 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:01.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:02.605160 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:02.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:02.605160 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:02.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:02.605160 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:02.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:02.605160 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:02.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:02.605160 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:02.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:03.605475 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:03.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:03.605475 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:03.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:03.605475 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:03.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:03.605475 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:03.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:03.605475 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:03.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:04.605302 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:04.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:04.605302 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:04.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:04.605302 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:04.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:04.606935 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:04.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:04.606935 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:04.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:04.725587 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:59:04.725Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:59:04.725587 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:59:04.725Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:59:05.606008 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:05.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:05.606008 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:05.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:05.606008 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:05.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:05.606008 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:05.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:05.606008 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:05.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:06.605893 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:06.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:06.605893 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:06.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:06.605893 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:06.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:06.605893 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:06.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:06.605893 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:06.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:07.605497 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:07.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:07.605497 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:07.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:07.606015 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:07.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:07.606015 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:07.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:07.606015 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:07.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:08.605995 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:08.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:08.605995 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:08.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:08.605995 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:08.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:08.605995 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:08.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:08.607096 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:08.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:09.605200 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:09.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:09.605200 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:09.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:09.605200 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:09.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:09.605200 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:09.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:09.605200 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:09.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:09.727011 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:59:09.726Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:59:09.727011 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:59:09.726Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:59:10.605890 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:10.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:10.605890 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:10.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:10.605890 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:10.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:10.605890 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:10.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:10.605890 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:10.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:11.605943 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:11.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:11.605943 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:11.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:11.605943 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:11.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:11.605943 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:11.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:11.605943 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:11.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:12.605847 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:12.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:12.605847 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:12.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:12.605847 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:12.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:12.606915 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:12.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:12.606915 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:12.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:13.605446 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:13.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:13.605446 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:13.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:13.605446 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:13.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:13.605446 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:13.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:13.605884 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:13.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:14.605337 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:14.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:14.605337 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:14.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:14.605337 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:14.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:14.605337 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:14.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:14.606904 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:14.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:14.727858 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:59:14.727Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"1.160173ms","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:59:14.727858 etcd-wrapper[3437]: {"level":"warn","ts":"2025-01-30T13:59:14.727Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"b1da9f7a3bcbf26a","rtt":"739.653µs","error":"dial tcp 172.31.22.227:2380: i/o timeout"} Jan 30 13:59:15.605259 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:15.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:15.605259 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:15.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:15.605530 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:15.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:15.605530 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:15.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:15.605530 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:15.604Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:16.605538 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:16.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:16.605538 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:16.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:16.605538 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:16.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:16.606268 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:16.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:16.606268 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:16.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"} Jan 30 13:59:17.605659 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:17.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 is starting a new election at term 6"} Jan 30 13:59:17.605659 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:17.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 became pre-candidate at term 6"} Jan 30 13:59:17.605659 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:17.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 received MsgPreVoteResp from 8afdd45dfef98e56 at term 6"} Jan 30 13:59:17.605659 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:17.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to b1da9f7a3bcbf26a at term 6"} Jan 30 13:59:17.605659 etcd-wrapper[3437]: {"level":"info","ts":"2025-01-30T13:59:17.605Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8afdd45dfef98e56 [logterm: 6, index: 322] sent MsgPreVote request to d3302519065413e2 at term 6"}