Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─615 /lib/systemd/systemd --user │ │ └─616 (sd-pam) │ ├─session-4.scope │ │ ├─1351 sshd: zuul [priv] │ │ └─1364 sshd: zuul@notty │ └─session-1.scope │ ├─ 612 sshd: zuul [priv] │ ├─ 629 sshd: zuul@notty │ ├─ 766 /usr/bin/python3 │ ├─ 1355 ssh: /home/zuul/.ansible/cp/199.19.213.181-22-zuul [mux] │ ├─37801 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-nqxlkaakooydfqngsoiimsbdzwxjepol ; /usr/bin/python3'"'"' && sleep 0' │ ├─37802 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-nqxlkaakooydfqngsoiimsbdzwxjepol ; /usr/bin/python3' && sleep 0 │ ├─37803 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-nqxlkaakooydfqngsoiimsbdzwxjepol ; /usr/bin/python3 │ ├─37804 /bin/sh -c echo BECOME-SUCCESS-nqxlkaakooydfqngsoiimsbdzwxjepol ; /usr/bin/python3 │ ├─37805 /usr/bin/python3 │ ├─37806 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37808 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2875 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4427 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2778f633b25d8bd6890575348d706ecbc2d2843ff6229c2e501e86d07559e637 -address /run/containerd/containerd.sock │ │ ├─ 4454 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e99ad9527496654b5858a7ad854ff73d01c11d8844cfbe572d46af2f0c0642f8 -address /run/containerd/containerd.sock │ │ ├─ 4481 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b63d43ae1d5380dbbbdab7323fd760db90a254a735ba664a2058bf7d4850a33c -address /run/containerd/containerd.sock │ │ ├─ 4488 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3c10b6deebabbc456da5364e6955671dfd3b63fdb139bc2cf7625f602e858255 -address /run/containerd/containerd.sock │ │ ├─ 4519 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a7ed35102e6586ae6708fe4f49f09390a5de4f0f3f61c6b882d15fe97aa4db08 -address /run/containerd/containerd.sock │ │ ├─ 4957 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0e958cf6ed4305c9c59aaaa4846709893bfbc3b8781f6f58d12a7f60409e6792 -address /run/containerd/containerd.sock │ │ ├─ 5658 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 666be048c2b20aeb95c00ec65e83bd530388ff72f870c17447024035900d47d0 -address /run/containerd/containerd.sock │ │ ├─ 5717 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 62f153df42ebd74c28640325d906051eb370ba9d48a8b70574d3138e709f7521 -address /run/containerd/containerd.sock │ │ ├─ 7027 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d952cd8e91fa9fa3394be30dbb01f27b9735252aeb42ddbac985039a1ae86358 -address /run/containerd/containerd.sock │ │ ├─ 7391 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bfc3fa44711d64d0b5eabf2bf8bee6af726f1c5012b928d625330f499bc3f534 -address /run/containerd/containerd.sock │ │ ├─ 7437 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e185d834c55c75bf50d55af5caffa6b9d31f258262234fe1592df8aeafac8f97 -address /run/containerd/containerd.sock │ │ ├─ 7795 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cb04d31f26f1e3426b8890a5d1b2262096c419c4e908cf743192ce55e7370520 -address /run/containerd/containerd.sock │ │ ├─ 8206 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3c3a1f4c8f64ea6ec5b1d6ea7a0eab74cb158e4f4b64dde9b3c18a050e534f95 -address /run/containerd/containerd.sock │ │ ├─ 8256 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7eaba23452ce3b19b9908c887437f5ae60914be093efc162fdb6d9039da75797 -address /run/containerd/containerd.sock │ │ ├─ 8323 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4a1c35f87398fdd158e219c3edef34d1ae9e8e6a36592a71d1383c0828c22444 -address /run/containerd/containerd.sock │ │ ├─10164 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2bf4e7d0baff3f160410b5b38791b0d5a28d5d7ba16ea948e421d16566389948 -address /run/containerd/containerd.sock │ │ ├─10219 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 61c9cf7531af45dafaf104b20b4ca309d033b863f674a3bc573cfc54680410af -address /run/containerd/containerd.sock │ │ ├─10847 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id db182f4aae9c69d51cd186c25d7e0f4f57f326d3cb1d211aea465c668955599e -address /run/containerd/containerd.sock │ │ ├─10938 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5c40617195140de7a221813ce1c21ccdd737f9953b94d152b99dfe7092bd65a6 -address /run/containerd/containerd.sock │ │ ├─11385 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9488c32e1639fa9f6500ed0b7148444d99d1abf48d12729026e1d42710fed5dd -address /run/containerd/containerd.sock │ │ ├─11701 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 690ebbd158395fd44cab043341ce47a54f828bd1bd3c70f862010363062c8da2 -address /run/containerd/containerd.sock │ │ ├─12012 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0b27ba6685faafff5e7fc1dce18eebb9cf99d40164739af3804d219afa0046d9 -address /run/containerd/containerd.sock │ │ ├─13660 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f53b19964f8f64265d4263f8e0b5bdddc2fdde6810a689e54f4a710e083681ae -address /run/containerd/containerd.sock │ │ ├─14279 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fd337b8c8e72e5371e50f4c3dd956fad7e7503f96bf7cd021899330a027af3c9 -address /run/containerd/containerd.sock │ │ ├─17937 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b8c6e470a18fd74113fad10e67890f9a141ef57fa122cecb96f4cba0b2c8b823 -address /run/containerd/containerd.sock │ │ ├─20392 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f4f2859aa560b8a0e4b991b3bef543b24ba701a9fca8fbb93bbf1f246176bc7f -address /run/containerd/containerd.sock │ │ ├─20485 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 05d5b3c8870c542e38b49174d53e50ab616428a01651b73f860775075aeaa19a -address /run/containerd/containerd.sock │ │ ├─20519 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 339eadcae0d04cb1a60d4711c54cb32d0459d4a79e3b46337e969ce4dbabfcd6 -address /run/containerd/containerd.sock │ │ ├─20537 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c9747d85b463ba94eee9ce72af034b48b052206048e137261bc00852467e79a6 -address /run/containerd/containerd.sock │ │ ├─21727 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8534583899b9ff9774a20233ed896bd6c8fed094d3b7ea57ec985831f5fcc28d -address /run/containerd/containerd.sock │ │ ├─21766 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7c82ccef98deffd313a0f9d7848d2a13f0078f93f4f0cdb6d85b13e22a62a5f7 -address /run/containerd/containerd.sock │ │ ├─22584 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 240034c84c58fa501e81ddba9183f17552c134ba4e3eddeedca5853aa4918088 -address /run/containerd/containerd.sock │ │ ├─24135 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f6c6ef01b4a511fceb7c8f583f672c4d6dc2e9caf2e6538ba094f8078511a511 -address /run/containerd/containerd.sock │ │ ├─29520 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2574e1d7590d3d81099b8f906fbffadd1a2bb996d436e4a55d97c02ad4d74f05 -address /run/containerd/containerd.sock │ │ ├─29562 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 47dfe0216cd6abeb825ec258b49e441073a654b7fcbf57bc90e90c39fb2ecdf0 -address /run/containerd/containerd.sock │ │ └─29638 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8e815e48a02d7ca17fb6c605af44751927084e7621fcf5c3f371e9b014829326 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1089 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─434 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─325 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─538 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─554 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─528 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4865 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.181 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─294 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─556 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1286 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─329 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─525 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─330 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─536 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─531 /lib/systemd/systemd-logind ├─k8s.io │ ├─3c10b6deebabbc456da5364e6955671dfd3b63fdb139bc2cf7625f602e858255 │ │ └─4572 /pause │ ├─3172d5a72009cb74d4ffd26873180cbd7884adc6074be30071233e676eada269 │ │ └─7976 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─072887fe3a77f770019c59db1847111312070fd48f1e3d4969164ec81a4ae4e4 │ │ └─4712 kube-apiserver --advertise-address=199.19.213.181 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─4a847b678644a8f32784c86f1677b2afe138a6c800e6c03e56ec75356fff88fb │ │ └─14098 /bin/memcached_exporter │ ├─6134657c41816ea7873f3e778959023068150db477604a35dfd29e4fd4337632 │ │ └─12386 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─0b27ba6685faafff5e7fc1dce18eebb9cf99d40164739af3804d219afa0046d9 │ │ └─12036 /pause │ ├─62f153df42ebd74c28640325d906051eb370ba9d48a8b70574d3138e709f7521 │ │ └─5741 /pause │ ├─0e958cf6ed4305c9c59aaaa4846709893bfbc3b8781f6f58d12a7f60409e6792 │ │ └─4982 /pause │ ├─ac34f1edfc1300b259c1289be273a367d98b2dc6d1ae1fafe92810fafa5e21a9 │ │ ├─31056 apache2 -DFOREGROUND │ │ ├─33411 (wsgi:h -DFOREGROUND │ │ ├─33412 (wsgi:h -DFOREGROUND │ │ ├─33413 (wsgi:h -DFOREGROUND │ │ ├─33414 (wsgi:h -DFOREGROUND │ │ ├─33415 (wsgi:h -DFOREGROUND │ │ ├─33416 apache2 -DFOREGROUND │ │ └─33417 apache2 -DFOREGROUND │ ├─bfc3fa44711d64d0b5eabf2bf8bee6af726f1c5012b928d625330f499bc3f534 │ │ └─7413 /pause │ ├─464e71c0b6d2cc6120662cbf69ea964e31ea34a3b21f006e992e4a03089d772e │ │ ├─31076 apache2 -DFOREGROUND │ │ ├─33492 (wsgi:h -DFOREGROUND │ │ ├─33493 (wsgi:h -DFOREGROUND │ │ ├─33494 (wsgi:h -DFOREGROUND │ │ ├─33495 (wsgi:h -DFOREGROUND │ │ ├─33496 (wsgi:h -DFOREGROUND │ │ ├─33497 apache2 -DFOREGROUND │ │ └─33498 apache2 -DFOREGROUND │ ├─65d52db0f545eb49f74fc59e13016ec3903bbba1a717e3cb04f82f1da414a1e8 │ │ └─22790 /bin/oauth2-proxy │ ├─9cae3c1addb4b64fe4ab4e9a567e14f69fe02d2d29e2f5d48a5a7267573b4ca7 │ │ └─4693 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─db182f4aae9c69d51cd186c25d7e0f4f57f326d3cb1d211aea465c668955599e │ │ └─10869 /pause │ ├─b4a6f1069ae39cba4840e44ae54511166ed44abe4b6da25a0d2b7977d4400a78 │ │ └─7082 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─eb36b438c7313dfa346d41dcb2fe094c3ba5c63bfad43b96d801543155871124 │ │ ├─12195 mysqld --wsrep_start_position=4745fbed-42b1-11f1-a223-8e2d6ced6d1d:20 │ │ └─12319 /var/lib/mysql/mysql-state-monitor │ ├─28da2a49294c9fecfa585fef03cb20b6bb79c7eb9e5799924376202481f4feee │ │ └─8482 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─690ebbd158395fd44cab043341ce47a54f828bd1bd3c70f862010363062c8da2 │ │ └─11726 /pause │ ├─cec9c59abf6ed2189ba0d1eff7aeb4e11fd513772638cc2565e6f9261db51438 │ │ └─23048 /bin/oauth2-proxy │ ├─83d1addd12768d3a325a4a8554242f5dd9a7326e88feb4b4272ceef2a198af56 │ │ └─22729 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─9a71e45ec0bb90130b99588c1e1c5faf1b2eb497dcebe20936fb2babbbeadb1e │ │ ├─21316 python -u /app/sidecar.py │ │ ├─21532 python -u /app/sidecar.py │ │ └─21533 python -u /app/sidecar.py │ ├─f4f2859aa560b8a0e4b991b3bef543b24ba701a9fca8fbb93bbf1f246176bc7f │ │ └─20434 /pause │ ├─0b5efc8907250f654b9aa856648c7540c838326cd02d17807db6a8188ee28f46 │ │ ├─12150 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13330 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─5c40617195140de7a221813ce1c21ccdd737f9953b94d152b99dfe7092bd65a6 │ │ └─10962 /pause │ ├─186b0b0286f06a39e58de662b860ef06051cc4abe7aee27034c1c40d6bd622e1 │ │ ├─31091 apache2 -DFOREGROUND │ │ ├─33570 (wsgi:h -DFOREGROUND │ │ ├─33571 (wsgi:h -DFOREGROUND │ │ ├─33572 (wsgi:h -DFOREGROUND │ │ ├─33573 (wsgi:h -DFOREGROUND │ │ ├─33574 (wsgi:h -DFOREGROUND │ │ ├─33575 apache2 -DFOREGROUND │ │ └─33576 apache2 -DFOREGROUND │ ├─8e815e48a02d7ca17fb6c605af44751927084e7621fcf5c3f371e9b014829326 │ │ └─29683 /pause │ ├─61c9cf7531af45dafaf104b20b4ca309d033b863f674a3bc573cfc54680410af │ │ └─10243 /pause │ ├─f6e781dc1a20746632032623fca093b6a391c5377dd90c921087c557ff9b6b36 │ │ └─12291 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─666be048c2b20aeb95c00ec65e83bd530388ff72f870c17447024035900d47d0 │ │ └─5684 /pause │ ├─c9747d85b463ba94eee9ce72af034b48b052206048e137261bc00852467e79a6 │ │ └─20582 /pause │ ├─30ee32b8e870a7b060fb8c62e6760d72fb3e7f00735926b080fad19e0e2e235f │ │ └─22390 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-181.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─32ab8b098c7f1e6cd33f329a56149d77ff6b60e6ff8b55eb98a34663206fe254 │ │ └─11260 /manager --metrics-bind-address=:8080 │ ├─47dfe0216cd6abeb825ec258b49e441073a654b7fcbf57bc90e90c39fb2ecdf0 │ │ └─29584 /pause │ ├─84d9a5466d25e1218e4943b90ae419478a660f63c302c2e057cc5218900162cb │ │ └─21363 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─a7ed35102e6586ae6708fe4f49f09390a5de4f0f3f61c6b882d15fe97aa4db08 │ │ └─4607 /pause │ ├─7eaba23452ce3b19b9908c887437f5ae60914be093efc162fdb6d9039da75797 │ │ └─8286 /pause │ ├─a4daa7354f39e2ad8524f7081fdbf1e249a0f9c51d1dc0dadc34e08fbdc55a15 │ │ └─4735 etcd --advertise-client-urls=https://199.19.213.181:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.181:2380 --initial-cluster=instance=https://199.19.213.181:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.181:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.181:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─7c82ccef98deffd313a0f9d7848d2a13f0078f93f4f0cdb6d85b13e22a62a5f7 │ │ └─21790 /pause │ ├─ed67a7f71100dca6c75e5e392bffeca1b12a4ec56590aecbc60ff51cfd38365a │ │ └─22440 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─b716ba7dce5a54d6030863774730cebaff522e02c46d39a476d532e821004523 │ │ └─11532 percona-xtradb-cluster-operator │ ├─8e00159b1f0b9a75d9c458ed42c8b3fda11444924a3fbe7cc005f3b87e893ab4 │ │ └─5833 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─f19953818959ff9da0168223ff0545fe9848b6ec45245e1314eac0fb720c7b7b │ │ └─22655 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-181.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─36a79d3566d38adff111befe6df0c5e84f38f629c478be4ddd62cb10653c0747 │ │ └─8444 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─4a1c35f87398fdd158e219c3edef34d1ae9e8e6a36592a71d1383c0828c22444 │ │ └─8347 /pause │ ├─6234f34abb14a5aa67be83ee16cd0802b32003777941c5e6ff39fed306fd49c6 │ │ ├─6326 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6641 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─3c3a1f4c8f64ea6ec5b1d6ea7a0eab74cb158e4f4b64dde9b3c18a050e534f95 │ │ └─8229 /pause │ ├─b63d43ae1d5380dbbbdab7323fd760db90a254a735ba664a2058bf7d4850a33c │ │ └─4570 /pause │ ├─797a6849f0f538f160db55df16d624318d14b3cc96efb9266b70d06df7c3e6f8 │ │ └─7521 /coredns -conf /etc/coredns/Corefile │ ├─f53b19964f8f64265d4263f8e0b5bdddc2fdde6810a689e54f4a710e083681ae │ │ └─13685 /pause │ ├─a8673e877622d880d375d8f091faf169c13bfb3e3b6e1021397bee54fae4a765 │ │ ├─10452 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10474 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10581 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30661 nginx: worker process │ │ ├─30662 nginx: worker process │ │ └─30663 nginx: cache manager process │ ├─9f121019c7e7aa3c9d7adf83558a1beacc7448973e6dbfe0821858b0779a8dbf │ │ └─22011 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─240034c84c58fa501e81ddba9183f17552c134ba4e3eddeedca5853aa4918088 │ │ └─22606 /pause │ ├─e185d834c55c75bf50d55af5caffa6b9d31f258262234fe1592df8aeafac8f97 │ │ └─7462 /pause │ ├─26aac8b9d6cced56de554e99ff905101caab2aa39730677a8c683e6bbd91e1f6 │ │ └─21575 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─7892e60f851f12e1967f290e7fbcade5538a8fe5ca09c65506354f903da1ef1a │ │ └─20892 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.34.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─f6c6ef01b4a511fceb7c8f583f672c4d6dc2e9caf2e6538ba094f8078511a511 │ │ └─24160 /pause │ ├─33b47a315da02b8f30dfd519b5cd61d82bb90d9b18e20d9eb3816fa46cfcc89a │ │ └─4820 /kube-vip manager │ ├─9488c32e1639fa9f6500ed0b7148444d99d1abf48d12729026e1d42710fed5dd │ │ └─11409 /pause │ ├─6c3974bb1330f79884f1bd0fff50c0c405a864f37280faa1c361c76164cac45e │ │ └─10522 /server │ ├─339eadcae0d04cb1a60d4711c54cb32d0459d4a79e3b46337e969ce4dbabfcd6 │ │ └─20580 /pause │ ├─2778f633b25d8bd6890575348d706ecbc2d2843ff6229c2e501e86d07559e637 │ │ └─4520 /pause │ ├─2574e1d7590d3d81099b8f906fbffadd1a2bb996d436e4a55d97c02ad4d74f05 │ │ └─29547 /pause │ ├─b6022abab24ff12233a9b1f86b818168de2bd09cbf0233c47e52b38866317ecb │ │ ├─21287 python -u /app/sidecar.py │ │ ├─21479 python -u /app/sidecar.py │ │ └─21480 python -u /app/sidecar.py │ ├─e99ad9527496654b5858a7ad854ff73d01c11d8844cfbe572d46af2f0c0642f8 │ │ └─4576 /pause │ ├─be63db36c466d0f60730edfc5a467d6b6a55c7b60a500e48f628bbc54894082c │ │ └─22761 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─d952cd8e91fa9fa3394be30dbb01f27b9735252aeb42ddbac985039a1ae86358 │ │ └─7052 /pause │ ├─4cf0e2cadec9694553482fd437db622134af4fadacf96c09997888e82cdbe812 │ │ └─7481 /coredns -conf /etc/coredns/Corefile │ ├─14779ab02def26424c651510ff2d2b37a19c98fc5130ef32a748ca69e65e19e9 │ │ └─5007 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─4f848d55a0dd4f82cedb01545680ec8db2776678b53442d3fffeb073b984e1fe │ │ ├─26312 apache2 -DFOREGROUND │ │ ├─26327 (wsgi:k -DFOREGROUND │ │ ├─26328 (wsgi:k -DFOREGROUND │ │ ├─26329 (wsgi:k -DFOREGROUND │ │ ├─26330 (wsgi:k -DFOREGROUND │ │ ├─26332 apache2 -DFOREGROUND │ │ ├─26333 apache2 -DFOREGROUND │ │ ├─26334 apache2 -DFOREGROUND │ │ ├─26336 apache2 -DFOREGROUND │ │ ├─26338 apache2 -DFOREGROUND │ │ ├─26339 apache2 -DFOREGROUND │ │ ├─26343 apache2 -DFOREGROUND │ │ ├─26344 apache2 -DFOREGROUND │ │ ├─26345 apache2 -DFOREGROUND │ │ └─26346 apache2 -DFOREGROUND │ ├─d35219de88d53f01f029bd89ef31b4e8ce9735da4316b4829eede059b83e7711 │ │ └─11164 /manager --metrics-bind-address=:9782 │ ├─cb04d31f26f1e3426b8890a5d1b2262096c419c4e908cf743192ce55e7370520 │ │ └─7817 /pause │ ├─eab37d11e61d27b2342af00d24910a1e16fbb0adcbeaf496f6b79394969f1619 │ │ └─17999 /secretgen-controller │ ├─9544ee7574c38eca735fde17c21a40d360b08c5d0837e4ae5f02c64fb2f4d837 │ │ └─22689 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─2bf4e7d0baff3f160410b5b38791b0d5a28d5d7ba16ea948e421d16566389948 │ │ └─10190 /pause │ ├─b8c6e470a18fd74113fad10e67890f9a141ef57fa122cecb96f4cba0b2c8b823 │ │ └─17960 /pause │ ├─644fda663450fb294ce2d2a9ce05718f39216bbc93acbaf1587906051f69767b │ │ └─14436 java -Dkc.config.built=true -Xms64m -Xmx512m -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─b6800b2cf71666578da0ff72e6f6f79902e2da137ed580d3daf5c3b510962e8e │ │ └─8520 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─fd337b8c8e72e5371e50f4c3dd956fad7e7503f96bf7cd021899330a027af3c9 │ │ └─14304 /pause │ ├─cb730bb55376494ef4825e8483762a1800af9bf1259744679e6d61e3096c50a8 │ │ └─14049 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─983b5ffca2097079d1a2db16ae8b85dd4913f219cf6ca6d9bf2638f84000fa24 │ │ ├─23100 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23117 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-13.2.2.6/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─23123 erl_child_setup 1048576 │ │ ├─23174 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/epmd -daemon │ │ ├─23209 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/inet_gethost 4 │ │ ├─23210 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/inet_gethost 4 │ │ └─23248 /bin/sh -s rabbit_disk_monitor │ ├─8534583899b9ff9774a20233ed896bd6c8fed094d3b7ea57ec985831f5fcc28d │ │ └─21751 /pause │ ├─15c58588fd2e7d94ea26e91a579879de7ac1b5f72601a6d5bb1c5df96f702c45 │ │ └─4676 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ └─05d5b3c8870c542e38b49174d53e50ab616428a01651b73f860775075aeaa19a │ └─20517 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount