Apr 4 14:26:04 computeinstance-e00yn526mf8qav0zyr kernel: [ 15.661217] kauditd_printk_skb: 30 callbacks suppressed Apr 4 14:26:04 computeinstance-e00yn526mf8qav0zyr kernel: [ 15.661220] audit: type=1400 audit(1743776764.359:42): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1743 comm="apparmor_parser" Apr 4 14:26:04 computeinstance-e00yn526mf8qav0zyr kernel: [ 15.931417] Initializing XFRM netlink socket Apr 4 14:26:04 computeinstance-e00yn526mf8qav0zyr kernel: [ 15.945219] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 4 14:26:06 computeinstance-e00yn526mf8qav0zyr kernel: [ 17.721049] loop3: detected capacity change from 0 to 8 Apr 4 14:31:11 computeinstance-e00yn526mf8qav0zyr kernel: [ 322.574310] loop3: detected capacity change from 0 to 91024 Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.906243] audit: type=1400 audit(1743777074.965:43): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine" pid=8506 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.907054] audit: type=1400 audit(1743777074.969:44): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/snap/snapd/23771/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=8506 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.917763] audit: type=1400 audit(1743777074.977:45): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap-update-ns.lxd" pid=8508 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.921748] audit: type=1400 audit(1743777074.981:46): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.install" pid=8515 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.922304] audit: type=1400 audit(1743777074.981:47): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.benchmark" pid=8510 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.922356] audit: type=1400 audit(1743777074.981:48): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.activate" pid=8509 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.922466] audit: type=1400 audit(1743777074.981:49): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.buginfo" pid=8511 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.922601] audit: type=1400 audit(1743777074.981:50): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.check-kernel" pid=8512 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.922830] audit: type=1400 audit(1743777074.981:51): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.hook.remove" pid=8516 comm="apparmor_parser" Apr 4 14:31:14 computeinstance-e00yn526mf8qav0zyr kernel: [ 325.923036] audit: type=1400 audit(1743777074.985:52): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="snap.lxd.lxc" pid=8517 comm="apparmor_parser" Apr 4 14:31:18 computeinstance-e00yn526mf8qav0zyr kernel: [ 329.825358] loop4: detected capacity change from 0 to 8 Apr 4 14:44:08 computeinstance-e00yn526mf8qav0zyr kernel: [ 1099.382737] kvm: SMP vm created on host with unstable TSC; guest TSC will not be reliable Apr 4 14:54:40 computeinstance-e00yn526mf8qav0zyr kernel: [ 1731.600297] TCP: request_sock_TCP: Possible SYN flooding on port 24653. Sending cookies. Check SNMP counters. Apr 4 14:55:42 computeinstance-e00yn526mf8qav0zyr kernel: [ 1793.038608] TCP: request_sock_TCP: Possible SYN flooding on port 2884. Sending cookies. Check SNMP counters. Apr 4 14:59:35 computeinstance-e00yn526mf8qav0zyr kernel: [ 2026.392799] TCP: request_sock_TCP: Possible SYN flooding on port 20397. Sending cookies. Check SNMP counters.