Mar 20 11:35:50 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 18.619221] kauditd_printk_skb: 30 callbacks suppressed Mar 20 11:35:50 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 18.619224] audit: type=1400 audit(1742470550.849:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1960 comm="apparmor_parser" Mar 20 11:35:51 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 18.909244] Initializing XFRM netlink socket Mar 20 11:35:51 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 18.921740] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 20 11:35:56 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 24.039227] loop3: detected capacity change from 0 to 8 Mar 20 11:41:01 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 329.092661] loop3: detected capacity change from 0 to 91024 Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.531986] audit: type=1400 audit(1742470865.921:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=8150 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.533025] audit: type=1400 audit(1742470865.921:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=8150 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.543929] audit: type=1400 audit(1742470865.933:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=8153 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.549069] audit: type=1400 audit(1742470865.937:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=8160 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.549602] audit: type=1400 audit(1742470865.937:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=8154 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.549736] audit: type=1400 audit(1742470865.937:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=8155 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.550037] audit: type=1400 audit(1742470865.937:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=8157 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.550090] audit: type=1400 audit(1742470865.937:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=8156 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.550462] audit: type=1400 audit(1742470865.937:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=8162 comm="apparmor_parser" Mar 20 11:41:05 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 333.550488] audit: type=1400 audit(1742470865.937:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=8161 comm="apparmor_parser" Mar 20 11:41:10 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 337.885208] loop4: detected capacity change from 0 to 8 Mar 20 11:41:14 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 342.372017] loop4: detected capacity change from 0 to 130552 Mar 20 11:50:09 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 876.775855] TCP: request_sock_TCP: Possible SYN flooding on port 26073. Sending cookies. Check SNMP counters. Mar 20 11:50:13 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 881.511793] TCP: request_sock_TCP: Possible SYN flooding on port 11572. Sending cookies. Check SNMP counters. Mar 20 12:02:06 computeinstance-e00vdqp0qycr5ssj1d kernel: [ 1593.972718] TCP: request_sock_TCP: Possible SYN flooding on port 4324. Sending cookies. Check SNMP counters.