Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─616 /lib/systemd/systemd --user │ │ └─617 (sd-pam) │ ├─session-22.scope │ │ ├─48731 sshd: zuul [priv] │ │ └─48744 sshd: zuul@notty │ ├─session-8.scope │ │ ├─9145 sshd: zuul [priv] │ │ └─9158 sshd: zuul@notty │ └─session-1.scope │ ├─ 613 sshd: zuul [priv] │ ├─ 630 sshd: zuul@notty │ ├─ 767 /usr/bin/python3 │ ├─ 9149 ssh: /home/zuul/.ansible/cp/b0f704ff34 [mux] │ ├─48735 ssh: /home/zuul/.ansible/cp/199.204.45.3-22-zuul [mux] │ ├─49231 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-hzusjbttsrkecregjzurtbqltbkcjjlg ; /usr/bin/python3'"'"' && sleep 0' │ ├─49232 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-hzusjbttsrkecregjzurtbqltbkcjjlg ; /usr/bin/python3' && sleep 0 │ ├─49233 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-hzusjbttsrkecregjzurtbqltbkcjjlg ; /usr/bin/python3 │ ├─49234 /bin/sh -c echo BECOME-SUCCESS-hzusjbttsrkecregjzurtbqltbkcjjlg ; /usr/bin/python3 │ ├─49235 /usr/bin/python3 │ ├─49238 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─49240 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 3028 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4589 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2c2c394ffd81399515a68dbce36463561a063e9e57f49cb38ada9c8704193ea8 -address /run/containerd/containerd.sock │ │ ├─ 4622 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b0b08cc3597abf9bb0ead4e48c61246a8a3c10328dd2526693676274d2c8e421 -address /run/containerd/containerd.sock │ │ ├─ 4640 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8627fc5ea5c13c9b47a9bd14a098ca86aefd5f05ce812f94a8720682ee567053 -address /run/containerd/containerd.sock │ │ ├─ 4648 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 22f0e56d93af899f88f3782346e423b6cb0056cd2d8a974af3fbdc8b35684366 -address /run/containerd/containerd.sock │ │ ├─ 4663 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5a36e0890121b62603e9eff8157ee699c530f754d6cb26d1c4652e4e247931ac -address /run/containerd/containerd.sock │ │ ├─ 5146 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 063d124f12c035d155eec5d1e5b576c76ef7cbc079798c708b0fea9faf666bd0 -address /run/containerd/containerd.sock │ │ ├─ 5755 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dff9f56b0bc6caa7066fe9adb2baf5287db95b13fa4ae75dbe6acfa28ac6314d -address /run/containerd/containerd.sock │ │ ├─ 5796 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ccf3a9840cc1c3ff3698be00136adec7d2767a861a06189631c3cbeaa95ce9d9 -address /run/containerd/containerd.sock │ │ ├─ 7265 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aff25d9309e6f67008aa8aaecba969a0d508306936f14500686a494de797eea9 -address /run/containerd/containerd.sock │ │ ├─ 7621 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e926d4c5358414fa3175a34c896443cc16ecd524333e9de2534660c6d18fb885 -address /run/containerd/containerd.sock │ │ ├─ 7668 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 00f25e1b8696d7775c0c3877c2acf731902121003e7d1c55a8b6e771580e566a -address /run/containerd/containerd.sock │ │ ├─ 8016 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0c50dfd4dd47b8f4d7064793109e539d69ed1a5a8bb9ebec21dc03e53fa594f8 -address /run/containerd/containerd.sock │ │ ├─16756 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b5cd1e6975b4ef137ae210d4b14f7f83248a4137c80fe7f5b0dbb4aacc0b9dc6 -address /run/containerd/containerd.sock │ │ ├─17001 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 61596307881b32676f8e547cda7219e931b14f33ead99a9073de8bd44c5980d2 -address /run/containerd/containerd.sock │ │ ├─17048 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4fc90950961299c76aa8fca981c5f14f7fb9ba4602d5d35db444d694f4bd8ec2 -address /run/containerd/containerd.sock │ │ ├─17051 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 599f89e68fecb077a7e7720ab6048a9492a3a1e06f794ee16ad0958a45dccf2b -address /run/containerd/containerd.sock │ │ ├─17479 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 79ca3b7f89a7c0d8b7c7076e69cbaf072e9edc6a0af404c4544f2a3ec6e85a0c -address /run/containerd/containerd.sock │ │ ├─17551 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3f9532c45618c43d9d6a2f36bbe0fb575d2f1fb226cee954f5a7a2c31e1f70af -address /run/containerd/containerd.sock │ │ ├─20428 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e1efd3b5be95bfb740efb71e1616463be518d7f4789ccda5ad9163d46f2849de -address /run/containerd/containerd.sock │ │ ├─20955 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 820d1f8c3e12ab644702541466ae391d5bb92fb09aad1a929550ecb6f781ebb8 -address /run/containerd/containerd.sock │ │ ├─21032 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4ced6d9b12877ab923e6d00e47592fc20b8ba35cc7939a753ecafc75413867b9 -address /run/containerd/containerd.sock │ │ ├─21735 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1141794e8a2b1cecb4bdfe07fdbc7965e1699c0e12db8c9e82cc1e414694079f -address /run/containerd/containerd.sock │ │ ├─22227 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7e71283a0e9376346eb9354c899a3c193574a1151cc4ce605cb2a1696f215dab -address /run/containerd/containerd.sock │ │ ├─22295 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c54a24a6302b03eae63d295d00be33f00f7953fcb5ca474b1aa5b524e7dbdc34 -address /run/containerd/containerd.sock │ │ ├─25422 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dbccadfd0433bf463e70a51aa8bd937273d9456a0a523779294bc2cc870e3c5c -address /run/containerd/containerd.sock │ │ ├─25933 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c1567eb4ab154c7ca929fca35b0bbe632a1fb0da78aec993aa7b9b41e963ae9f -address /run/containerd/containerd.sock │ │ ├─33463 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3aea2e4f36c673e1448835d5a9153942ce0f7d0a4a1a2f88b8b59df88e389b2e -address /run/containerd/containerd.sock │ │ ├─38709 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6a5df0c98ab27f61042f19fe327933341c5fd6c4e0f8974037c2be16dce35ee7 -address /run/containerd/containerd.sock │ │ ├─39204 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b28dd0aa31e372a70f502b0f0be16aa154e8b2e65e03d27d803ac4b720a844a1 -address /run/containerd/containerd.sock │ │ ├─39249 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 23ac92a3357b7fa6df54503305de263ef6b81854104b8512fbca55225eefec21 -address /run/containerd/containerd.sock │ │ ├─39320 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ee0548c8394a9504c4f5377139cec62f98d22eb2f3ffa480985a416ec8651d8e -address /run/containerd/containerd.sock │ │ ├─46323 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2ee9a37ab00b2e66a4cf346a256566596daad5c776c8c40c78f0e87e7b8aeb39 -address /run/containerd/containerd.sock │ │ ├─46416 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6c82d7ad0ec93b32d79d298af7d58e74056760d105ce1beda65511fd2538a4e8 -address /run/containerd/containerd.sock │ │ ├─46456 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5f7c62f9a833afdcfa4fbd4249c319f97fa8abf59989c2b60e4263f210ca706a -address /run/containerd/containerd.sock │ │ ├─46510 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id df67e2d9502f97849776a8d817cd4e8610b2e03c20afeb918ef0fb4212156a32 -address /run/containerd/containerd.sock │ │ ├─47772 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d7fe318b674ecb323b1d18c47ce000c73d6ff205e23e0183c02e6fdd42ddb47d -address /run/containerd/containerd.sock │ │ ├─47857 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 58d6273783fad02eff57ebca61d6e7a229c5d1fd0f3c467947e27d461c21db3f -address /run/containerd/containerd.sock │ │ └─49110 runc --root /run/containerd/runc/k8s.io --log /run/containerd/io.containerd.runtime.v2.task/k8s.io/7a27fa56c4f241770b33737ccaa248179df5cf0ee8cf182a90a64213cc67d2f6/log.json --log-format json exec --process /tmp/runc-process3075012957 --detach --pid-file /run/containerd/io.containerd.runtime.v2.task/k8s.io/7a27fa56c4f241770b33737ccaa248179df5cf0ee8cf182a90a64213cc67d2f6/7ce02805a2730aab8b6e5cbfe2ac9a91dcc9723ad3a1da165121c59f55587711.pid 7a27fa56c4f241770b33737ccaa248179df5cf0ee8cf182a90a64213cc67d2f6 │ ├─packagekit.service │ │ └─1092 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─439 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─330 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─558 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─535 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─5029 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.3 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─559 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1447 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─543 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─2c2c394ffd81399515a68dbce36463561a063e9e57f49cb38ada9c8704193ea8 │ │ └─4678 /pause │ ├─5550aa2cd37cd19eea004091484480e3032f6094422977608f3d38611d501197 │ │ ├─41820 apache2 -DFOREGROUND │ │ ├─43719 (wsgi:h -DFOREGROUND │ │ ├─43720 (wsgi:h -DFOREGROUND │ │ ├─43721 (wsgi:h -DFOREGROUND │ │ ├─43722 (wsgi:h -DFOREGROUND │ │ ├─43723 (wsgi:h -DFOREGROUND │ │ ├─43724 apache2 -DFOREGROUND │ │ └─43725 apache2 -DFOREGROUND │ ├─d7fe318b674ecb323b1d18c47ce000c73d6ff205e23e0183c02e6fdd42ddb47d │ │ └─47799 /pause │ ├─7ec9ef17c453b18aa234782e8f595885727aa91ed06d20d5611c03fa61dd8cc0 │ │ └─4892 etcd --advertise-client-urls=https://199.204.45.3:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.3:2380 --initial-cluster=instance=https://199.204.45.3:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.3:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.3:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─7a19afd08e9c9c8f1382f58f80e75fd35d538006f79c5ce5bc9c0a742a86d5a5 │ │ └─17400 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─3fbd442bdea4d2472150224483c57a1c0faeb9a54c439ca5fda8b8bfc49d0b32 │ │ └─7711 /coredns -conf /etc/coredns/Corefile │ ├─b7d2bf41414bce74efcfe6858952ea500dade9201036bbef87d2b7741912bab0 │ │ └─17921 /server │ ├─063d124f12c035d155eec5d1e5b576c76ef7cbc079798c708b0fea9faf666bd0 │ │ └─5170 /pause │ ├─22f0e56d93af899f88f3782346e423b6cb0056cd2d8a974af3fbdc8b35684366 │ │ └─4742 /pause │ ├─5f7c62f9a833afdcfa4fbd4249c319f97fa8abf59989c2b60e4263f210ca706a │ │ └─46482 /pause │ ├─dff9f56b0bc6caa7066fe9adb2baf5287db95b13fa4ae75dbe6acfa28ac6314d │ │ └─5782 /pause │ ├─23ac92a3357b7fa6df54503305de263ef6b81854104b8512fbca55225eefec21 │ │ └─39292 /pause │ ├─ba001ff10de3305c0afbaf0cdc9af4f9154f9bc7f1d3d7bd1e5ef48c271284be │ │ └─46763 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─e926d4c5358414fa3175a34c896443cc16ecd524333e9de2534660c6d18fb885 │ │ └─7647 /pause │ ├─dfb5c8a3ca0b569ba2078378643975190118232e649beb3b7a52128556e87623 │ │ ├─33624 apache2 -DFOREGROUND │ │ ├─33639 (wsgi:k -DFOREGROUND │ │ ├─33640 (wsgi:k -DFOREGROUND │ │ ├─33641 (wsgi:k -DFOREGROUND │ │ ├─33642 (wsgi:k -DFOREGROUND │ │ ├─33643 apache2 -DFOREGROUND │ │ ├─33646 apache2 -DFOREGROUND │ │ ├─33647 apache2 -DFOREGROUND │ │ ├─33648 apache2 -DFOREGROUND │ │ ├─33649 apache2 -DFOREGROUND │ │ ├─33650 apache2 -DFOREGROUND │ │ ├─33652 apache2 -DFOREGROUND │ │ ├─33655 apache2 -DFOREGROUND │ │ ├─33657 apache2 -DFOREGROUND │ │ └─33658 apache2 -DFOREGROUND │ ├─673cf71e33afed40f9810982707eb2fb80c720acefa4be72431fab91f409dc34 │ │ └─6359 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─79ca3b7f89a7c0d8b7c7076e69cbaf072e9edc6a0af404c4544f2a3ec6e85a0c │ │ └─17504 /pause │ ├─df67e2d9502f97849776a8d817cd4e8610b2e03c20afeb918ef0fb4212156a32 │ │ └─46533 /pause │ ├─4bd600c714e893a76a2834b03872f03e74ddd465e21591a1fddc532db8917888 │ │ └─49027 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─9e7bf89abb2c30f22dc24ce78e21a763e52b0414ef92da5e63b97f33b6feaeef │ │ ├─17873 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─17886 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─17943 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─46791 nginx: worker process │ │ ├─46792 nginx: worker process │ │ └─46793 nginx: cache manager process │ ├─7c84316a6971efea69742c22dbafd73512bbb5841d95f44f4323cb3290df6dcf │ │ └─21652 /manager --metrics-bind-address=:9782 │ ├─cf5cd1b0a77d954a6a794b5fd65eb2da001909016e48f98626243909acfcdc1e │ │ └─22365 valkey-server *:6379 │ ├─6a5df0c98ab27f61042f19fe327933341c5fd6c4e0f8974037c2be16dce35ee7 │ │ └─38733 /pause │ ├─49e9d4502f1bd6f730ae0d79269c1731cccde8a857e9e1678a4c84d3e456768c │ │ └─48476 /bin/oauth2-proxy │ ├─8627fc5ea5c13c9b47a9bd14a098ca86aefd5f05ce812f94a8720682ee567053 │ │ └─4770 /pause │ ├─6b4674fc7a1985bd71ab0e52cb0456257c46617247442a3334c4f7fec2312c92 │ │ ├─6558 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6882 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─1064eaaaa83bafc6bc0424979fb1c7788fe9fa7450077a5f8bd37f938156523f │ │ └─22658 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─39a380d7c45081e0eca61b7b9c35747e0fa715f899e69e61e75f539671a25252 │ │ └─17808 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─5b3b8f3cd2ea4de9148ab4963d66671080e062783ee26cf2acd89de199d6b681 │ │ └─48201 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-3.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─aff25d9309e6f67008aa8aaecba969a0d508306936f14500686a494de797eea9 │ │ └─7289 /pause │ ├─ac75031e0cb0aed8eb354c0ab899daabd7a01bf2456be79dc24b4ee00324e7fb │ │ └─48234 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─dce35a50940326f61277be3feee0e53ee18f92aec6453ee318ffa275c894c110 │ │ └─17310 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─cdad6d1866be4d36225fbba9575e8c57014d3cc14dc1261f07373aaf329dab2b │ │ └─21460 percona-xtradb-cluster-operator │ ├─c54a24a6302b03eae63d295d00be33f00f7953fcb5ca474b1aa5b524e7dbdc34 │ │ └─22318 /pause │ ├─b0b08cc3597abf9bb0ead4e48c61246a8a3c10328dd2526693676274d2c8e421 │ │ └─4737 /pause │ ├─6a6617888635e91b160a9dc25fd3bdf6ef6a2a35247c4fd0e063190c60777c06 │ │ └─25742 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─00f25e1b8696d7775c0c3877c2acf731902121003e7d1c55a8b6e771580e566a │ │ └─7692 /pause │ ├─5f4b0d44872ac38db77bfd0383a13f4186dbdeebfc81b63d45312ba125682923 │ │ └─22910 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─56b2f261512e0b93e6e591568068abacb465ceacc1a79f93a3a4c65c5db36e83 │ │ └─8086 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─2b64d792b8a6175d409e886ebe1c9c085e5bd36d71827e6e77b67832069a9c35 │ │ ├─26148 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─26164 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─26170 erl_child_setup 1048576 │ │ ├─26278 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─26279 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─26289 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─26474 /bin/sh -s rabbit_disk_monitor │ ├─7e71283a0e9376346eb9354c899a3c193574a1151cc4ce605cb2a1696f215dab │ │ └─22259 /pause │ ├─b0e28ef948fed43eda616d0ec9a5117870d797a608d0a94409268b31b501aecd │ │ └─48334 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-3.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─d3e9d6b74da45e6e888743d656164599c252a9dd8ab26333c0797d87fe81f92f │ │ ├─22561 mysqld --wsrep_start_position=fac06603-41ff-11f1-a803-bfade6ed2b44:20 │ │ └─22687 /var/lib/mysql/mysql-state-monitor │ ├─820d1f8c3e12ab644702541466ae391d5bb92fb09aad1a929550ecb6f781ebb8 │ │ └─20985 /pause │ ├─86499fe85ceb4da52f07c42e5a1d48e44165dc894ccee9fa9a7cb3aaa2c52766 │ │ ├─22473 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─26393 haproxy -sf 203 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─bae7b0e9800c71c203e5664e21ea9828b584974e9c9b6556cd4e13999c77f67e │ │ └─18030 /bin/memcached_exporter │ ├─b5cd1e6975b4ef137ae210d4b14f7f83248a4137c80fe7f5b0dbb4aacc0b9dc6 │ │ └─16786 /pause │ ├─58d6273783fad02eff57ebca61d6e7a229c5d1fd0f3c467947e27d461c21db3f │ │ └─47881 /pause │ ├─1b8ed1c8ba5dc7e64aeb9bb7218fb302132c441fe03fac05279fb5325389820c │ │ └─7323 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─6c82d7ad0ec93b32d79d298af7d58e74056760d105ce1beda65511fd2538a4e8 │ │ └─46441 /pause │ ├─5a36e0890121b62603e9eff8157ee699c530f754d6cb26d1c4652e4e247931ac │ │ └─4758 /pause │ ├─cd1c692f2a94decca27cbc1d8655b3f0446cec333a9d6a2f88e3e5e5f10af96b │ │ ├─46939 python -u /app/sidecar.py │ │ ├─47256 python -u /app/sidecar.py │ │ └─47257 python -u /app/sidecar.py │ ├─2ee9a37ab00b2e66a4cf346a256566596daad5c776c8c40c78f0e87e7b8aeb39 │ │ └─46361 /pause │ ├─dbccadfd0433bf463e70a51aa8bd937273d9456a0a523779294bc2cc870e3c5c │ │ └─25446 /pause │ ├─b28dd0aa31e372a70f502b0f0be16aa154e8b2e65e03d27d803ac4b720a844a1 │ │ └─39228 /pause │ ├─5dbcaac26cbdc237859800e48d80f8178f7bb27313b340f1afac79c5e2d5cdf7 │ │ └─47163 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─50a1e5e2f6f40205bf6a973c2e53c2e4960c97c7a29ff424b3da5f81a45865de │ │ ├─41835 apache2 -DFOREGROUND │ │ ├─43558 (wsgi:h -DFOREGROUND │ │ ├─43559 (wsgi:h -DFOREGROUND │ │ ├─43560 (wsgi:h -DFOREGROUND │ │ ├─43561 (wsgi:h -DFOREGROUND │ │ ├─43562 (wsgi:h -DFOREGROUND │ │ ├─43563 apache2 -DFOREGROUND │ │ └─43564 apache2 -DFOREGROUND │ ├─e1efd3b5be95bfb740efb71e1616463be518d7f4789ccda5ad9163d46f2849de │ │ └─20452 /pause │ ├─4ced6d9b12877ab923e6d00e47592fc20b8ba35cc7939a753ecafc75413867b9 │ │ └─21061 /pause │ ├─ee0548c8394a9504c4f5377139cec62f98d22eb2f3ffa480985a416ec8651d8e │ │ └─39350 /pause │ ├─1141794e8a2b1cecb4bdfe07fdbc7965e1699c0e12db8c9e82cc1e414694079f │ │ └─21758 /pause │ ├─983565007cad229115641f1f133283737398c58fe4cb05ed973997cde11f4d3e │ │ └─4884 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─7a27fa56c4f241770b33737ccaa248179df5cf0ee8cf182a90a64213cc67d2f6 │ │ ├─22517 valkey-server *:26379 [sentinel] │ │ ├─49160 runc init │ │ ├─49161 sh -c /health/ping_sentinel.sh 1 │ │ ├─49236 /bin/bash /health/ping_sentinel.sh 1 │ │ └─49237 /bin/bash /health/ping_sentinel.sh 1 │ ├─299a3eb1e1b18f026c93db9d0d3fb7153e8b3f6cdeaabf651fa29e871c926c04 │ │ └─47057 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─599f89e68fecb077a7e7720ab6048a9492a3a1e06f794ee16ad0958a45dccf2b │ │ └─17102 /pause │ ├─d692483ed1b3bedaaad114256db5ea1152dd1365bc1aca83b3ed86d014490163 │ │ └─48372 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─a965405aa5c8af67a579b8c0b388781dd73ca1809e084b555ebb6424ed05ba93 │ │ ├─41792 apache2 -DFOREGROUND │ │ ├─43480 (wsgi:h -DFOREGROUND │ │ ├─43481 (wsgi:h -DFOREGROUND │ │ ├─43482 (wsgi:h -DFOREGROUND │ │ ├─43483 (wsgi:h -DFOREGROUND │ │ ├─43484 (wsgi:h -DFOREGROUND │ │ ├─43485 apache2 -DFOREGROUND │ │ └─43486 apache2 -DFOREGROUND │ ├─328d58e38dd564c33880a6e5922af0115667791aa935a983b9e138d1bcc7fb3a │ │ └─48409 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─7c4eeb051d5a13fedd679d1e343026dcffdd9dc9f479c09150c3132a8ff618a6 │ │ ├─46964 python -u /app/sidecar.py │ │ ├─47343 python -u /app/sidecar.py │ │ └─47344 python -u /app/sidecar.py │ ├─2bd1f98147c9117f1d497d664afc4eb97a12c0f2df60fd2e72e6db4983ebb0c0 │ │ └─7756 /coredns -conf /etc/coredns/Corefile │ ├─c1567eb4ab154c7ca929fca35b0bbe632a1fb0da78aec993aa7b9b41e963ae9f │ │ └─25957 /pause │ ├─3aea2e4f36c673e1448835d5a9153942ce0f7d0a4a1a2f88b8b59df88e389b2e │ │ └─33488 /pause │ ├─49b730a7df010bb4723887e31d71484214b5ae42981d65701f51ee932a827ca0 │ │ └─21833 /manager --metrics-bind-address=:8080 │ ├─e7ddfc9dd556b2a482001cd4cb4f86a7b2d220994b973e8907aa2fcae1aba00b │ │ └─17445 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─a10edb6340c72204fa6e9304c7a2d411dd6ced8b3af83c7eadfd1a15f774fdc3 │ │ └─47961 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─4fc90950961299c76aa8fca981c5f14f7fb9ba4602d5d35db444d694f4bd8ec2 │ │ └─17120 /pause │ ├─081abd0a6ec23aa0cc7f579cbf596512f8a5cd7d6e5c64c08f0a9592f085fc97 │ │ └─4979 /kube-vip manager │ ├─9edc6f45b4456dbd851e2d75c5ba556e721c779cb28024d9f6b96cf85fe8d655 │ │ └─48455 /bin/oauth2-proxy │ ├─7004ccb150668de9dd612a0ecb7a53ed6b945599eca11ea85b812e86245fe2dd │ │ └─38856 /secretgen-controller │ ├─f61c9787537d666922074085a57199e242cdfb15785a5f87fc68149c0cf9e84c │ │ └─4855 kube-apiserver --advertise-address=199.204.45.3 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─802ba8994fd996681b56efc4fccc988b1b19054c18a76fd0e3d8bdf8652b30bc │ │ └─22848 redis_exporter │ ├─3f9532c45618c43d9d6a2f36bbe0fb575d2f1fb226cee954f5a7a2c31e1f70af │ │ └─17574 /pause │ ├─ccf3a9840cc1c3ff3698be00136adec7d2767a861a06189631c3cbeaa95ce9d9 │ │ └─5827 /pause │ ├─b3189a4fd82f3e3810affd53b70192a6c7708ec1f4f2c8dddfd48ddcc8d4bb37 │ │ └─5197 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─61596307881b32676f8e547cda7219e931b14f33ead99a9073de8bd44c5980d2 │ │ └─17025 /pause │ ├─176f0f0a8bce98582afba0ec3359978ad8ae7f80abc7388284dc14516757a494 │ │ └─4836 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ └─0c50dfd4dd47b8f4d7064793109e539d69ed1a5a8bb9ebec21dc03e53fa594f8 │ └─8039 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount