Apr 1 11:09:54 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 16.181650] kauditd_printk_skb: 30 callbacks suppressed Apr 1 11:09:54 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 16.181654] audit: type=1400 audit(1743505794.444:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1581 comm="apparmor_parser" Apr 1 11:09:54 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 16.459609] Initializing XFRM netlink socket Apr 1 11:09:54 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 16.471096] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 1 11:10:00 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 21.788690] loop3: detected capacity change from 0 to 8 Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.107962] loop3: detected capacity change from 0 to 91024 Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.311901] audit: type=1400 audit(1743505805.653:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=2409 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.312719] audit: type=1400 audit(1743505805.653:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=2409 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.323817] audit: type=1400 audit(1743505805.665:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=2411 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.328027] audit: type=1400 audit(1743505805.669:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=2418 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.329332] audit: type=1400 audit(1743505805.669:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=2415 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.329368] audit: type=1400 audit(1743505805.669:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=2419 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.329392] audit: type=1400 audit(1743505805.669:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=2413 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.329427] audit: type=1400 audit(1743505805.669:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=2414 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.329446] audit: type=1400 audit(1743505805.669:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=2412 comm="apparmor_parser" Apr 1 11:10:05 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 26.329540] audit: type=1400 audit(1743505805.669:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc-to-lxd" pid=2421 comm="apparmor_parser" Apr 1 11:10:09 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 30.539600] loop4: detected capacity change from 0 to 8 Apr 1 11:29:02 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 1163.133309] TCP: request_sock_TCP: Possible SYN flooding on port 26823. Sending cookies. Check SNMP counters. Apr 1 11:29:54 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 1214.905075] TCP: request_sock_TCP: Possible SYN flooding on port 14457. Sending cookies. Check SNMP counters. Apr 1 11:39:52 computeinstance-e00tw5cz0pk82xgxbr kernel: [ 1812.737408] TCP: request_sock_TCP: Possible SYN flooding on port 63248. Sending cookies. Check SNMP counters.