Apr 2 05:01:56 computeinstance-e00tm64vax14f6j3j9 kernel: [ 17.014625] kauditd_printk_skb: 30 callbacks suppressed Apr 2 05:01:56 computeinstance-e00tm64vax14f6j3j9 kernel: [ 17.014630] audit: type=1400 audit(1743570116.166:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1953 comm="apparmor_parser" Apr 2 05:01:56 computeinstance-e00tm64vax14f6j3j9 kernel: [ 17.284087] Initializing XFRM netlink socket Apr 2 05:01:56 computeinstance-e00tm64vax14f6j3j9 kernel: [ 17.299994] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 2 05:02:01 computeinstance-e00tm64vax14f6j3j9 kernel: [ 22.459976] loop3: detected capacity change from 0 to 8 Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 25.899579] loop3: detected capacity change from 0 to 91024 Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.096378] audit: type=1400 audit(1743570125.490:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=2993 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.097103] audit: type=1400 audit(1743570125.490:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=2993 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.112290] audit: type=1400 audit(1743570125.508:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=2995 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.116423] audit: type=1400 audit(1743570125.512:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=3002 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.117341] audit: type=1400 audit(1743570125.512:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=2996 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.117421] audit: type=1400 audit(1743570125.512:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=2997 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.117502] audit: type=1400 audit(1743570125.512:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=2998 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.117664] audit: type=1400 audit(1743570125.512:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=2999 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.117777] audit: type=1400 audit(1743570125.512:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=3004 comm="apparmor_parser" Apr 2 05:02:05 computeinstance-e00tm64vax14f6j3j9 kernel: [ 26.117843] audit: type=1400 audit(1743570125.512:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=3003 comm="apparmor_parser" Apr 2 05:02:09 computeinstance-e00tm64vax14f6j3j9 kernel: [ 30.072045] loop4: detected capacity change from 0 to 8 Apr 2 05:02:12 computeinstance-e00tm64vax14f6j3j9 kernel: [ 32.831596] loop4: detected capacity change from 0 to 130552 Apr 2 05:16:01 computeinstance-e00tm64vax14f6j3j9 kernel: [ 861.586437] TCP: request_sock_TCP: Possible SYN flooding on port 27344. Sending cookies. Check SNMP counters. Apr 2 05:16:43 computeinstance-e00tm64vax14f6j3j9 kernel: [ 903.444604] TCP: request_sock_TCP: Possible SYN flooding on port 1676. Sending cookies. Check SNMP counters. Apr 2 05:23:45 computeinstance-e00tm64vax14f6j3j9 kernel: [ 1325.151757] TCP: request_sock_TCP: Possible SYN flooding on port 62574. Sending cookies. Check SNMP counters.