Mar 11 04:20:23 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 17.615398] kauditd_printk_skb: 30 callbacks suppressed Mar 11 04:20:23 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 17.615402] audit: type=1400 audit(1741666823.682:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1954 comm="apparmor_parser" Mar 11 04:20:23 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 17.881750] Initializing XFRM netlink socket Mar 11 04:20:23 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 17.894870] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 11 04:20:29 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 22.974208] loop3: detected capacity change from 0 to 8 Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.676381] loop3: detected capacity change from 0 to 91024 Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.878557] audit: type=1400 audit(1741666833.220:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=2982 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.879475] audit: type=1400 audit(1741666833.220:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=2982 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.890064] audit: type=1400 audit(1741666833.228:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=2984 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.894634] audit: type=1400 audit(1741666833.233:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=2991 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.895352] audit: type=1400 audit(1741666833.233:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=2992 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.895442] audit: type=1400 audit(1741666833.233:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=2993 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.895459] audit: type=1400 audit(1741666833.233:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc-to-lxd" pid=2994 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.895490] audit: type=1400 audit(1741666833.233:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxd" pid=2995 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.895516] audit: type=1400 audit(1741666833.233:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=2985 comm="apparmor_parser" Mar 11 04:20:33 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 26.895593] audit: type=1400 audit(1741666833.233:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=2986 comm="apparmor_parser" Mar 11 04:20:37 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 31.082820] loop4: detected capacity change from 0 to 8 Mar 11 04:20:40 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 34.001727] loop4: detected capacity change from 0 to 130552 Mar 11 04:44:27 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 1460.854171] TCP: request_sock_TCP: Possible SYN flooding on port 28191. Sending cookies. Check SNMP counters. Mar 11 04:48:02 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 1675.921605] TCP: request_sock_TCP: Possible SYN flooding on port 4959. Sending cookies. Check SNMP counters. Mar 11 05:00:43 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 2437.457339] hrtimer: interrupt took 25276 ns Mar 11 05:21:14 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 3667.813998] TCP: request_sock_TCP: Possible SYN flooding on port 61058. Sending cookies. Check SNMP counters. Mar 11 05:23:05 computeinstance-e00pwmp5ga0rfdkhvz kernel: [ 3779.080195] TCP: request_sock_TCP: Possible SYN flooding on port 30883. Sending cookies. Check SNMP counters.