[!p]104[?7h2026/01/20 06:43:09Z: Amazon SSM Agent v3.3.0.0 is running 2026/01/20 06:43:09Z: OsProductName: Flatcar Container Linux by Kinvolk 2026/01/20 06:43:09Z: OsVersion: 4585.0.0 This is ip-172-31-20-78 (Linux x86_64 6.12.66-flatcar) 06:43:09 SSH host key: SHA256:4BNNLSwW1Bfxuwf1fOAeDmz/yXucNrmk4Ra87f7DWFk (ED25519) SSH host key: SHA256:Jw3yqW9I+uedPBoJRtEThevCF2iMdsGzlcgFlHavazc (ECDSA) SSH host key: SHA256:sayKL9CYNmjwp3egyIy1Et9fcJwmTnrOjQhmsIubGgE (RSA) eth0: 172.31.20.78 fe80::426:11ff:fe02:3e97 This is ip-172-31-20-78 (Linux x86_64 6.12.66-flatcar) 06:43:09 SSH host key: SHA256:4BNNLSwW1Bfxuwf1fOAeDmz/yXucNrmk4Ra87f7DWFk (ED25519) SSH host key: SHA256:Jw3yqW9I+uedPBoJRtEThevCF2iMdsGzlcgFlHavazc (ECDSA) SSH host key: SHA256:sayKL9CYNmjwp3egyIy1Et9fcJwmTnrOjQhmsIubGgE (RSA) eth0: 172.31.20.78 fe80::426:11ff:fe02:3e97 ip-172-31-20-78 login: [ 34.274891] kauditd_printk_skb: 53 callbacks suppressed [ 34.274895] audit: type=1305 audit(1768891402.509:206): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 34.278292] audit: type=1300 audit(1768891402.509:206): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdcf31ffe0 a2=420 a3=0 items=0 ppid=2167 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/bin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 34.282692] audit: type=1327 audit(1768891402.509:206): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 [ 34.285723] audit: type=1130 audit(1768891402.520:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 34.289621] audit: type=1131 audit(1768891402.520:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 34.294299] audit: type=1106 audit(1768891402.528:209): pid=2161 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_umask,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 34.298597] audit: type=1104 audit(1768891402.528:210): pid=2161 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 34.376598] audit: type=1106 audit(1768891402.611:211): pid=2156 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_namespace,pam_keyinit,pam_limits,pam_env,pam_umask,pam_unix,pam_systemd,pam_lastlog,pam_mail acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' [ 34.383028] audit: type=1104 audit(1768891402.611:212): pid=2156 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' [ 34.387443] audit: type=1131 audit(1768891402.613:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.20.78:22-68.220.241.50:59292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 39.313345] kauditd_printk_skb: 16 callbacks suppressed [ 39.313349] audit: type=1106 audit(1768891407.548:228): pid=2217 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_umask,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 39.319780] audit: type=1104 audit(1768891407.554:229): pid=2217 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 39.330513] audit: type=1101 audit(1768891407.565:230): pid=2200 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 39.335468] audit: type=1110 audit(1768891407.565:231): pid=2200 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 39.341045] audit: type=1105 audit(1768891407.565:232): pid=2200 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_umask,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 39.987925] Initializing XFRM netlink socket [ 40.062870] audit: type=1325 audit(1768891408.297:233): table=nat:2 family=2 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 40.066088] audit: type=1300 audit(1768891408.297:233): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff239518b0 a2=0 a3=0 items=0 ppid=2231 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/bin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 40.072746] audit: type=1327 audit(1768891408.297:233): proctitle=2F7573722F62696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 [ 40.077410] audit: type=1325 audit(1768891408.312:234): table=filter:3 family=2 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 40.080611] audit: type=1300 audit(1768891408.312:234): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe8f9dc8f0 a2=0 a3=0 items=0 ppid=2231 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/bin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) This is ip-172-31-20-78 (Linux x86_64 6.12.66-flatcar) 06:43:29 SSH host key: SHA256:4BNNLSwW1Bfxuwf1fOAeDmz/yXucNrmk4Ra87f7DWFk (ED25519) SSH host key: SHA256:Jw3yqW9I+uedPBoJRtEThevCF2iMdsGzlcgFlHavazc (ECDSA) SSH host key: SHA256:sayKL9CYNmjwp3egyIy1Et9fcJwmTnrOjQhmsIubGgE (RSA) eth0: 172.31.20.78 fe80::426:11ff:fe02:3e97 This is ip-172-31-20-78 (Linux x86_64 6.12.66-flatcar) 06:43:29 SSH host key: SHA256:4BNNLSwW1Bfxuwf1fOAeDmz/yXucNrmk4Ra87f7DWFk (ED25519) SSH host key: SHA256:Jw3yqW9I+uedPBoJRtEThevCF2iMdsGzlcgFlHavazc (ECDSA) SSH host key: SHA256:sayKL9CYNmjwp3egyIy1Et9fcJwmTnrOjQhmsIubGgE (RSA) eth0: 172.31.20.78 fe80::426:11ff:fe02:3e97 ip-172-31-20-78 login: [ 42.228782] docker0: port 1(veth8dfca83) entered blocking state [ 42.229968] docker0: port 1(veth8dfca83) entered disabled state [ 42.231081] veth8dfca83: entered allmulticast mode [ 42.232111] veth8dfca83: entered promiscuous mode [ 42.258917] eth0: renamed from vethd214152 [ 42.260482] docker0: port 1(veth8dfca83) entered blocking state [ 42.261554] docker0: port 1(veth8dfca83) entered forwarding state [ 43.969754] docker0: port 1(veth8dfca83) entered disabled state [ 43.971878] vethd214152: renamed from eth0 [ 43.990706] docker0: port 1(veth8dfca83) entered disabled state [ 43.994432] veth8dfca83 (unregistering): left allmulticast mode [ 43.995774] veth8dfca83 (unregistering): left promiscuous mode [ 43.997040] docker0: port 1(veth8dfca83) entered disabled state This is ip-172-31-20-78 (Linux x86_64 6.12.66-flatcar) 06:43:32 SSH host key: SHA256:4BNNLSwW1Bfxuwf1fOAeDmz/yXucNrmk4Ra87f7DWFk (ED25519) SSH host key: SHA256:Jw3yqW9I+uedPBoJRtEThevCF2iMdsGzlcgFlHavazc (ECDSA) SSH host key: SHA256:sayKL9CYNmjwp3egyIy1Et9fcJwmTnrOjQhmsIubGgE (RSA) eth0: 172.31.20.78 fe80::426:11ff:fe02:3e97 This is ip-172-31-20-78 (Linux x86_64 6.12.66-flatcar) 06:43:32 SSH host key: SHA256:4BNNLSwW1Bfxuwf1fOAeDmz/yXucNrmk4Ra87f7DWFk (ED25519) SSH host key: SHA256:Jw3yqW9I+uedPBoJRtEThevCF2iMdsGzlcgFlHavazc (ECDSA) SSH host key: SHA256:sayKL9CYNmjwp3egyIy1Et9fcJwmTnrOjQhmsIubGgE (RSA) eth0: 172.31.20.78 fe80::426:11ff:fe02:3e97 ip-172-31-20-78 login: This is ip-172-31-20-78 (Linux x86_64 6.12.66-flatcar) 06:43:33 SSH host key: SHA256:4BNNLSwW1Bfxuwf1fOAeDmz/yXucNrmk4Ra87f7DWFk (ED25519) SSH host key: SHA256:Jw3yqW9I+uedPBoJRtEThevCF2iMdsGzlcgFlHavazc (ECDSA) SSH host key: SHA256:sayKL9CYNmjwp3egyIy1Et9fcJwmTnrOjQhmsIubGgE (RSA) eth0: 172.31.20.78 fe80::426:11ff:fe02:3e97 This is ip-172-31-20-78 (Linux x86_64 6.12.66-flatcar) 06:43:33 SSH host key: SHA256:4BNNLSwW1Bfxuwf1fOAeDmz/yXucNrmk4Ra87f7DWFk (ED25519) SSH host key: SHA256:Jw3yqW9I+uedPBoJRtEThevCF2iMdsGzlcgFlHavazc (ECDSA) SSH host key: SHA256:sayKL9CYNmjwp3egyIy1Et9fcJwmTnrOjQhmsIubGgE (RSA) eth0: 172.31.20.78 fe80::426:11ff:fe02:3e97 ip-172-31-20-78 login: [ 47.259210] kauditd_printk_skb: 212 callbacks suppressed [ 47.259214] audit: type=1106 audit(1768891415.493:334): pid=2094 uid=0 auid=500 ses=1 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_namespace,pam_keyinit,pam_limits,pam_env,pam_umask,pam_unix,pam_systemd,pam_lastlog,pam_mail acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' [ 47.259355] audit: type=1104 audit(1768891415.494:335): pid=2094 uid=0 auid=500 ses=1 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock acct="core" exe="/usr/lib64/misc/sshd-session" hostname=68.220.241.50 addr=68.220.241.50 terminal=ssh res=success' [ 47.287850] audit: type=1131 audit(1768891415.522:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata-sshkeys@core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 47.297421] audit: type=1131 audit(1768891415.530:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 47.306180] audit: type=1131 audit(1768891415.540:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 47.314047] audit: type=1131 audit(1768891415.548:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=nvidia comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 47.327081] audit: type=1131 audit(1768891415.561:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshkeys comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 47.337315] audit: type=1131 audit(1768891415.572:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 47.355330] audit: type=1131 audit(1768891415.590:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-load-credentials comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 47.367292] audit: type=1131 audit(1768891415.600:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=update-ssh-keys-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'