[Tue Sep 24 01:41:16 2024] Unsafe core_pattern used with fs.suid_dumpable=2. Pipe handler or fully qualified core dump path required. Set kernel.core_pattern before fs.suid_dumpable. [Tue Sep 24 01:42:16 2024] capability: warning: `clickhouse-clie' uses 32-bit capabilities (legacy support in use) [Tue Sep 24 01:44:46 2024] audit: type=1400 audit(1727135086.546:16): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="lsb_release" pid=16946 comm="apparmor_parser" [Tue Sep 24 01:44:46 2024] audit: type=1400 audit(1727135086.598:17): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="nvidia_modprobe" pid=16949 comm="apparmor_parser" [Tue Sep 24 01:44:46 2024] audit: type=1400 audit(1727135086.614:18): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="nvidia_modprobe//kmod" pid=16949 comm="apparmor_parser" [Tue Sep 24 01:44:47 2024] audit: type=1400 audit(1727135087.022:19): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="lsb_release" pid=17003 comm="apparmor_parser" [Tue Sep 24 01:44:47 2024] audit: type=1400 audit(1727135087.022:20): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="nvidia_modprobe" pid=17004 comm="apparmor_parser" [Tue Sep 24 01:44:47 2024] audit: type=1400 audit(1727135087.050:21): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="nvidia_modprobe//kmod" pid=17004 comm="apparmor_parser" [Tue Sep 24 01:44:47 2024] audit: type=1400 audit(1727135087.086:22): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/bin/man" pid=17006 comm="apparmor_parser" [Tue Sep 24 01:44:47 2024] audit: type=1400 audit(1727135087.086:23): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="man_filter" pid=17006 comm="apparmor_parser" [Tue Sep 24 01:44:47 2024] audit: type=1400 audit(1727135087.086:24): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="man_groff" pid=17006 comm="apparmor_parser" [Tue Sep 24 01:44:47 2024] audit: type=1400 audit(1727135087.130:25): apparmor="STATUS" operation="profile_replace" info="same as current profile, skipping" profile="unconfined" name="tcpdump" pid=17007 comm="apparmor_parser" [Tue Sep 24 01:46:15 2024] systemd[1]: systemd 249.11-0ubuntu3.9 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [Tue Sep 24 01:46:15 2024] systemd[1]: Detected virtualization kvm. [Tue Sep 24 01:46:15 2024] systemd[1]: Detected architecture x86-64. [Tue Sep 24 01:46:15 2024] systemd[1]: Configuration file /run/systemd/system/netplan-ovs-cleanup.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway.