Apr 1 12:53:40 computeinstance-e00v42j4y4hr2ar671 kernel: [ 16.760323] kauditd_printk_skb: 30 callbacks suppressed Apr 1 12:53:40 computeinstance-e00v42j4y4hr2ar671 kernel: [ 16.760327] audit: type=1400 audit(1743512020.899:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1957 comm="apparmor_parser" Apr 1 12:53:41 computeinstance-e00v42j4y4hr2ar671 kernel: [ 17.030236] Initializing XFRM netlink socket Apr 1 12:53:41 computeinstance-e00v42j4y4hr2ar671 kernel: [ 17.043464] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 1 12:53:46 computeinstance-e00v42j4y4hr2ar671 kernel: [ 22.397863] loop3: detected capacity change from 0 to 8 Apr 1 12:53:52 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.235520] loop3: detected capacity change from 0 to 91024 Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.446735] audit: type=1400 audit(1743512033.070:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=3002 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.447712] audit: type=1400 audit(1743512033.070:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=3002 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.457606] audit: type=1400 audit(1743512033.083:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=3014 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.462141] audit: type=1400 audit(1743512033.087:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=3021 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.463004] audit: type=1400 audit(1743512033.087:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=3015 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.463138] audit: type=1400 audit(1743512033.087:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=3016 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.463152] audit: type=1400 audit(1743512033.087:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=3017 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.463186] audit: type=1400 audit(1743512033.087:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=3018 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.463437] audit: type=1400 audit(1743512033.087:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=3023 comm="apparmor_parser" Apr 1 12:53:53 computeinstance-e00v42j4y4hr2ar671 kernel: [ 28.463458] audit: type=1400 audit(1743512033.087:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=3022 comm="apparmor_parser" Apr 1 12:53:57 computeinstance-e00v42j4y4hr2ar671 kernel: [ 32.450311] loop4: detected capacity change from 0 to 8 Apr 1 12:54:00 computeinstance-e00v42j4y4hr2ar671 kernel: [ 36.345820] loop4: detected capacity change from 0 to 130552 Apr 1 13:07:38 computeinstance-e00v42j4y4hr2ar671 kernel: [ 853.432034] TCP: request_sock_TCP: Possible SYN flooding on port 25063. Sending cookies. Check SNMP counters. Apr 1 13:08:38 computeinstance-e00v42j4y4hr2ar671 kernel: [ 913.747795] TCP: request_sock_TCP: Possible SYN flooding on port 20957. Sending cookies. Check SNMP counters. Apr 1 13:17:54 computeinstance-e00v42j4y4hr2ar671 kernel: [ 1469.877523] TCP: request_sock_TCP: Possible SYN flooding on port 6427. Sending cookies. Check SNMP counters.