Mar 11 21:49:01 computeinstance-e00st4yvamn5rk5drn kernel: [ 17.160710] kauditd_printk_skb: 30 callbacks suppressed Mar 11 21:49:01 computeinstance-e00st4yvamn5rk5drn kernel: [ 17.160714] audit: type=1400 audit(1741729741.329:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1955 comm="apparmor_parser" Mar 11 21:49:01 computeinstance-e00st4yvamn5rk5drn kernel: [ 17.454194] Initializing XFRM netlink socket Mar 11 21:49:01 computeinstance-e00st4yvamn5rk5drn kernel: [ 17.467500] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 11 21:49:05 computeinstance-e00st4yvamn5rk5drn kernel: [ 21.639073] loop3: detected capacity change from 0 to 8 Mar 11 21:54:09 computeinstance-e00st4yvamn5rk5drn kernel: [ 325.111917] loop3: detected capacity change from 0 to 91024 Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.107914] audit: type=1400 audit(1741730055.606:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=8200 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.108764] audit: type=1400 audit(1741730055.606:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=8200 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.119160] audit: type=1400 audit(1741730055.618:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=8202 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.124169] audit: type=1400 audit(1741730055.622:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=8209 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.124856] audit: type=1400 audit(1741730055.622:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=8203 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.124861] audit: type=1400 audit(1741730055.622:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=8204 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.125167] audit: type=1400 audit(1741730055.622:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=8205 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.125369] audit: type=1400 audit(1741730055.622:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=8206 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.125549] audit: type=1400 audit(1741730055.622:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=8211 comm="apparmor_parser" Mar 11 21:54:15 computeinstance-e00st4yvamn5rk5drn kernel: [ 331.125570] audit: type=1400 audit(1741730055.622:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc-to-lxd" pid=8212 comm="apparmor_parser" Mar 11 21:54:19 computeinstance-e00st4yvamn5rk5drn kernel: [ 335.315931] loop4: detected capacity change from 0 to 8 Mar 11 21:54:23 computeinstance-e00st4yvamn5rk5drn kernel: [ 338.589568] loop4: detected capacity change from 0 to 130552 Mar 11 22:03:51 computeinstance-e00st4yvamn5rk5drn kernel: [ 906.704035] TCP: request_sock_TCP: Possible SYN flooding on port 23778. Sending cookies. Check SNMP counters. Mar 11 22:05:25 computeinstance-e00st4yvamn5rk5drn kernel: [ 1001.003066] TCP: request_sock_TCP: Possible SYN flooding on port 7739. Sending cookies. Check SNMP counters. Mar 11 22:11:02 computeinstance-e00st4yvamn5rk5drn kernel: [ 1338.119518] TCP: request_sock_TCP: Possible SYN flooding on port 5413. Sending cookies. Check SNMP counters.