Mar 31 15:38:30 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 17.724695] kauditd_printk_skb: 30 callbacks suppressed Mar 31 15:38:30 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 17.724698] audit: type=1400 audit(1743435510.834:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1964 comm="apparmor_parser" Mar 31 15:38:31 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 17.977920] Initializing XFRM netlink socket Mar 31 15:38:31 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 17.992811] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 31 15:38:34 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 21.839489] loop3: detected capacity change from 0 to 8 Mar 31 15:43:38 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 325.098560] loop3: detected capacity change from 0 to 91024 Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.321079] audit: type=1400 audit(1743435824.908:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=8851 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.322126] audit: type=1400 audit(1743435824.912:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=8851 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.333320] audit: type=1400 audit(1743435824.920:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=8853 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.338404] audit: type=1400 audit(1743435824.928:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=8860 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.339354] audit: type=1400 audit(1743435824.928:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=8854 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.339413] audit: type=1400 audit(1743435824.928:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=8855 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.339622] audit: type=1400 audit(1743435824.928:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=8856 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.339680] audit: type=1400 audit(1743435824.928:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=8857 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.339827] audit: type=1400 audit(1743435824.928:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=8861 comm="apparmor_parser" Mar 31 15:43:44 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 331.339845] audit: type=1400 audit(1743435824.928:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=8862 comm="apparmor_parser" Mar 31 15:43:49 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 335.642691] loop4: detected capacity change from 0 to 8 Mar 31 15:43:52 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 338.816291] loop4: detected capacity change from 0 to 130552 Mar 31 16:06:39 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 1705.672662] TCP: request_sock_TCP: Possible SYN flooding on port 10146. Sending cookies. Check SNMP counters. Mar 31 16:07:48 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 1774.405601] TCP: request_sock_TCP: Possible SYN flooding on port 12836. Sending cookies. Check SNMP counters. Mar 31 16:19:17 computeinstance-e00jc3vbhqgmgkah5g kernel: [ 2464.188333] TCP: request_sock_TCP: Possible SYN flooding on port 28241. Sending cookies. Check SNMP counters.