Mar 7 12:06:17 computeinstance-e00y14sh5ctm64ycqp kernel: [ 16.559507] kauditd_printk_skb: 30 callbacks suppressed Mar 7 12:06:17 computeinstance-e00y14sh5ctm64ycqp kernel: [ 16.559511] audit: type=1400 audit(1741349177.410:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1952 comm="apparmor_parser" Mar 7 12:06:17 computeinstance-e00y14sh5ctm64ycqp kernel: [ 16.850425] Initializing XFRM netlink socket Mar 7 12:06:17 computeinstance-e00y14sh5ctm64ycqp kernel: [ 16.863953] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 7 12:06:23 computeinstance-e00y14sh5ctm64ycqp kernel: [ 22.454115] loop3: detected capacity change from 0 to 8 Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 39.682747] loop3: detected capacity change from 0 to 91024 Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.195466] audit: type=1400 audit(1741349200.768:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=3161 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.196349] audit: type=1400 audit(1741349200.768:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=3161 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.207298] audit: type=1400 audit(1741349200.780:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=3163 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.212351] audit: type=1400 audit(1741349200.784:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=3170 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.213029] audit: type=1400 audit(1741349200.784:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=3164 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.213221] audit: type=1400 audit(1741349200.784:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=3165 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.213289] audit: type=1400 audit(1741349200.784:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=3171 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.213364] audit: type=1400 audit(1741349200.784:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=3166 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.213377] audit: type=1400 audit(1741349200.784:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc-to-lxd" pid=3173 comm="apparmor_parser" Mar 7 12:06:40 computeinstance-e00y14sh5ctm64ycqp kernel: [ 40.213440] audit: type=1400 audit(1741349200.784:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=3172 comm="apparmor_parser" Mar 7 12:06:44 computeinstance-e00y14sh5ctm64ycqp kernel: [ 44.182969] loop4: detected capacity change from 0 to 8 Mar 7 12:06:56 computeinstance-e00y14sh5ctm64ycqp kernel: [ 56.278113] loop4: detected capacity change from 0 to 130552 Mar 7 12:23:44 computeinstance-e00y14sh5ctm64ycqp kernel: [ 1064.370155] TCP: request_sock_TCP: Possible SYN flooding on port 15423. Sending cookies. Check SNMP counters. Mar 7 12:24:29 computeinstance-e00y14sh5ctm64ycqp kernel: [ 1109.068612] TCP: request_sock_TCP: Possible SYN flooding on port 14627. Sending cookies. Check SNMP counters. Mar 7 12:29:46 computeinstance-e00y14sh5ctm64ycqp kernel: [ 1425.701019] TCP: request_sock_TCP: Possible SYN flooding on port 7163. Sending cookies. Check SNMP counters.