Mar 7 10:40:10 computeinstance-e00mwfjzrjnksaytvc kernel: [ 17.381995] kauditd_printk_skb: 30 callbacks suppressed Mar 7 10:40:10 computeinstance-e00mwfjzrjnksaytvc kernel: [ 17.381997] audit: type=1400 audit(1741344010.575:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1955 comm="apparmor_parser" Mar 7 10:40:10 computeinstance-e00mwfjzrjnksaytvc kernel: [ 17.632168] Initializing XFRM netlink socket Mar 7 10:40:10 computeinstance-e00mwfjzrjnksaytvc kernel: [ 17.645432] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 7 10:40:16 computeinstance-e00mwfjzrjnksaytvc kernel: [ 22.870318] loop3: detected capacity change from 0 to 8 Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.304107] loop3: detected capacity change from 0 to 91024 Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.524390] audit: type=1400 audit(1741344020.722:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=2975 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.525453] audit: type=1400 audit(1741344020.722:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=2975 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.536721] audit: type=1400 audit(1741344020.734:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=2978 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.541243] audit: type=1400 audit(1741344020.738:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=2985 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.542161] audit: type=1400 audit(1741344020.738:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=2979 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.542223] audit: type=1400 audit(1741344020.738:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=2980 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.542282] audit: type=1400 audit(1741344020.738:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=2981 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.542340] audit: type=1400 audit(1741344020.738:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=2982 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.543263] audit: type=1400 audit(1741344020.742:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=2986 comm="apparmor_parser" Mar 7 10:40:20 computeinstance-e00mwfjzrjnksaytvc kernel: [ 27.543277] audit: type=1400 audit(1741344020.742:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=2987 comm="apparmor_parser" Mar 7 10:40:24 computeinstance-e00mwfjzrjnksaytvc kernel: [ 31.720262] loop4: detected capacity change from 0 to 8 Mar 7 10:40:29 computeinstance-e00mwfjzrjnksaytvc kernel: [ 35.905009] loop4: detected capacity change from 0 to 130552 Mar 7 11:01:47 computeinstance-e00mwfjzrjnksaytvc kernel: [ 1314.663026] hrtimer: interrupt took 21900 ns Mar 7 11:32:25 computeinstance-e00mwfjzrjnksaytvc kernel: [ 3151.736351] TCP: request_sock_TCP: Possible SYN flooding on port 13407. Sending cookies. Check SNMP counters.