Mar 14 11:42:44 computeinstance-e00chffka5hg0evm9h kernel: [ 17.210993] kauditd_printk_skb: 30 callbacks suppressed Mar 14 11:42:44 computeinstance-e00chffka5hg0evm9h kernel: [ 17.210996] audit: type=1400 audit(1741952564.365:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1952 comm="apparmor_parser" Mar 14 11:42:44 computeinstance-e00chffka5hg0evm9h kernel: [ 17.507878] Initializing XFRM netlink socket Mar 14 11:42:44 computeinstance-e00chffka5hg0evm9h kernel: [ 17.521574] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 14 11:42:48 computeinstance-e00chffka5hg0evm9h kernel: [ 21.648150] loop3: detected capacity change from 0 to 8 Mar 14 11:47:54 computeinstance-e00chffka5hg0evm9h kernel: [ 327.298742] loop3: detected capacity change from 0 to 91024 Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.760331] audit: type=1400 audit(1741952878.698:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=8438 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.761513] audit: type=1400 audit(1741952878.698:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=8438 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.772996] audit: type=1400 audit(1741952878.710:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=8440 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.777881] audit: type=1400 audit(1741952878.714:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=8447 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.778891] audit: type=1400 audit(1741952878.714:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=8441 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.778959] audit: type=1400 audit(1741952878.714:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=8442 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.778987] audit: type=1400 audit(1741952878.714:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=8443 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.779077] audit: type=1400 audit(1741952878.714:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=8444 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.779472] audit: type=1400 audit(1741952878.714:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=8449 comm="apparmor_parser" Mar 14 11:47:58 computeinstance-e00chffka5hg0evm9h kernel: [ 331.779610] audit: type=1400 audit(1741952878.714:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc-to-lxd" pid=8450 comm="apparmor_parser" Mar 14 11:48:02 computeinstance-e00chffka5hg0evm9h kernel: [ 336.049188] loop4: detected capacity change from 0 to 8 Mar 14 11:48:07 computeinstance-e00chffka5hg0evm9h kernel: [ 340.066496] loop4: detected capacity change from 0 to 130552 Mar 14 11:58:28 computeinstance-e00chffka5hg0evm9h kernel: [ 961.325552] TCP: request_sock_TCP: Possible SYN flooding on port 20959. Sending cookies. Check SNMP counters. Mar 14 11:58:28 computeinstance-e00chffka5hg0evm9h kernel: [ 961.553501] TCP: request_sock_TCP: Possible SYN flooding on port 4567. Sending cookies. Check SNMP counters. Mar 14 12:09:59 computeinstance-e00chffka5hg0evm9h kernel: [ 1652.981732] TCP: request_sock_TCP: Possible SYN flooding on port 10090. Sending cookies. Check SNMP counters.