Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─613 /lib/systemd/systemd --user │ │ └─614 (sd-pam) │ ├─session-4.scope │ │ ├─1350 sshd: zuul [priv] │ │ └─1363 sshd: zuul@notty │ └─session-1.scope │ ├─ 610 sshd: zuul [priv] │ ├─ 627 sshd: zuul@notty │ ├─ 764 /usr/bin/python3 │ ├─ 1354 ssh: /home/zuul/.ansible/cp/199.204.45.116-22-zuul [mux] │ ├─38914 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-mehpfvztfprhclcdqqjgengqqhrguvhh ; /usr/bin/python3'"'"' && sleep 0' │ ├─38915 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-mehpfvztfprhclcdqqjgengqqhrguvhh ; /usr/bin/python3' && sleep 0 │ ├─38916 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-mehpfvztfprhclcdqqjgengqqhrguvhh ; /usr/bin/python3 │ ├─38917 /bin/sh -c echo BECOME-SUCCESS-mehpfvztfprhclcdqqjgengqqhrguvhh ; /usr/bin/python3 │ ├─38918 /usr/bin/python3 │ ├─38920 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38922 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2872 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4444 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 151f66e497e8a53ea61474c6de586d0836533c7011f2bb8837fe22e92ff5b159 -address /run/containerd/containerd.sock │ │ ├─ 4472 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5b4b06ed595451fc1cdc041ac0b5a80203dc929c2ed0b148b467b255d04f219a -address /run/containerd/containerd.sock │ │ ├─ 4524 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 00f69ae8fe404c21e5ad3898d48eea614fe34e35a10011aff6499f7aab2479a1 -address /run/containerd/containerd.sock │ │ ├─ 4546 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e09632a9cf7023a09834f886d60394128165c56c2c0acca4d242d0e7fd1836bc -address /run/containerd/containerd.sock │ │ ├─ 4551 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 871eb349d8eeb68ba6b96f4f77315d049a186238d2356eb708033b81618d7867 -address /run/containerd/containerd.sock │ │ ├─ 5014 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6cee33ea02a284c87da031f63ee9c642e45907d99679c18e1518a4de4f91adb6 -address /run/containerd/containerd.sock │ │ ├─ 5676 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c4902d3d2939c191b1df13701177e82ec4a1fc5c334c2451959638bc6360ea19 -address /run/containerd/containerd.sock │ │ ├─ 5689 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 53156929df5cb36b2b3a97d59e16d57843f1ff43544aeacb15fce8e77cd95d82 -address /run/containerd/containerd.sock │ │ ├─ 6861 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id de0fdd7febfd0bae481a983d90a2b4155dca418e161dab813acc9b784d32e5ef -address /run/containerd/containerd.sock │ │ ├─ 7200 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fff223b91ed5ad57a123bfde2fec9735a6824cd4fe300b572dfc1e0e9dc1c348 -address /run/containerd/containerd.sock │ │ ├─ 7238 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 85b9f634ec1c73cc0e240133ab6d2625ba13b44f00b99064ce1fe869cb6f21fc -address /run/containerd/containerd.sock │ │ ├─ 7598 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6b98ff45b4ae6430991a6d2c851408ced3da8ff569cc71c24d672dc7cb6d9c63 -address /run/containerd/containerd.sock │ │ ├─ 8053 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ec925804eaa96c1388fe8e6abef592ce6cc17bc492554fb08d5ee32c9acf56b1 -address /run/containerd/containerd.sock │ │ ├─ 8085 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 727fbab725bbcd1e3105adb4825130f9733b4d249a63c2f7ba4fe70e49c24880 -address /run/containerd/containerd.sock │ │ ├─ 8128 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 302313878b697db753ea9921e6aa2469cfaa2d91db37124d780b689accc77de8 -address /run/containerd/containerd.sock │ │ ├─10288 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d42a38ccba57fa1ea3648d04b3bec543b64e5894851dc78e29520424e96d5a2c -address /run/containerd/containerd.sock │ │ ├─10382 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7d31020c4f42f7f4b422153fcc6ab1e43a5c295c334f3f567f9539debd4fac65 -address /run/containerd/containerd.sock │ │ ├─11042 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2df9eaaa2e1576c7ef0baaa85ec87d47ce8f192c1db6446f608b0a00c0b3a645 -address /run/containerd/containerd.sock │ │ ├─11082 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 261e6509bdbfc12909b79d363a48e9fad62218b6ef287d9ca822044930fed3ac -address /run/containerd/containerd.sock │ │ ├─11567 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cf88cce314930178e0f6a50c11b12a7bb327ca903fd8dea19809dcc6f5b8db22 -address /run/containerd/containerd.sock │ │ ├─11834 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1e0ec8fd06ff2d0b8d382cb576ee95bb58f132a63d6dd7feec5db089d3ce8ec4 -address /run/containerd/containerd.sock │ │ ├─12228 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 00e0da9723026cb211a5ee90d0701b8ad6eb1321cc47403b5f139f74c86a86b5 -address /run/containerd/containerd.sock │ │ ├─14021 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9b39183c3b6bf1ce63ca67a1561215a9dba481691bfd6d901b19bd2585b7a1a5 -address /run/containerd/containerd.sock │ │ ├─14628 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e7d4b21585b6b0c937306c074c1061368e9835e4842b2422ed6d98949a87a646 -address /run/containerd/containerd.sock │ │ ├─18535 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7ebec3ca079fa3619c3b5a547ebd904e9bf9e0ad67636a6e373f8064ae5fb839 -address /run/containerd/containerd.sock │ │ ├─21214 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 055a63065614e8e1c43b5a9d0a04eb52eadc3af454acd7445bd470e7ca6343f7 -address /run/containerd/containerd.sock │ │ ├─21313 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2bd8cc5120db1411ea6637a474293ad517717831578fa17bb14ed2542d6fbd0a -address /run/containerd/containerd.sock │ │ ├─21351 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d6bbe759def6096b5473fc5970ed3b7fae65ae90a7cfcd2caeb8e4131d438016 -address /run/containerd/containerd.sock │ │ ├─21404 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a846f99d9a785ac57039600fe70fc24f29d91f22c2f47e92a303ecf08e3bb63c -address /run/containerd/containerd.sock │ │ ├─22729 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9165a5ba55f4f26617dcf69e6627c225fb47be0280d7d6f251c720432891ee7c -address /run/containerd/containerd.sock │ │ ├─22871 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 134ac6744fa8f496b769ec575602229aacd0e478f2f0ca616a911c8b7a55f0d9 -address /run/containerd/containerd.sock │ │ ├─23355 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8302622931281768ea60dfe8ff2f6e6d50cbf7306ba556cac0cd103a01770c85 -address /run/containerd/containerd.sock │ │ ├─25106 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b7fa3d26632646fe4bdc434a0312bd7eea9a546ed51d57b13903c648a934fe10 -address /run/containerd/containerd.sock │ │ ├─30446 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fae75829f71e271b79d503ee33bab071e9dec231eda92103ea97988283e29b42 -address /run/containerd/containerd.sock │ │ ├─30488 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a9b9b772b085203c156c1dae01dc227370d637053757e131dbe7ac307268829e -address /run/containerd/containerd.sock │ │ └─30532 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 30af811b4fe5be6ee28cfa19d1cac02686d3c6d61e1fc6b84bd6e1d719037d67 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1088 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─538 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─554 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─531 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4879 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.116 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─295 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─559 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1285 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─331 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─528 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─537 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─534 /lib/systemd/systemd-logind ├─k8s.io │ ├─6cee33ea02a284c87da031f63ee9c642e45907d99679c18e1518a4de4f91adb6 │ │ └─5038 /pause │ ├─fae75829f71e271b79d503ee33bab071e9dec231eda92103ea97988283e29b42 │ │ └─30471 /pause │ ├─5803e1be99a53d19beae3bff67d18c227d094058cad71273fd0c4eb1b1dc35cb │ │ └─23596 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─befd99f3192af875c8888c7912a8cd90a1b5554dee5af2e2a47706bca31ea851 │ │ └─7296 /coredns -conf /etc/coredns/Corefile │ ├─fff223b91ed5ad57a123bfde2fec9735a6824cd4fe300b572dfc1e0e9dc1c348 │ │ └─7225 /pause │ ├─de0fdd7febfd0bae481a983d90a2b4155dca418e161dab813acc9b784d32e5ef │ │ └─6886 /pause │ ├─ba21c25ec3bf28c119280e37c046631eeccc2d6d315cc36f547b063d48cd9806 │ │ └─21989 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─49461e8864409ab8e1357a8bb7dd64112a514695eee158e0eb478b00aee5628d │ │ ├─31969 apache2 -DFOREGROUND │ │ ├─34015 (wsgi:h -DFOREGROUND │ │ ├─34016 (wsgi:h -DFOREGROUND │ │ ├─34017 (wsgi:h -DFOREGROUND │ │ ├─34018 (wsgi:h -DFOREGROUND │ │ ├─34019 (wsgi:h -DFOREGROUND │ │ ├─34020 apache2 -DFOREGROUND │ │ └─34021 apache2 -DFOREGROUND │ ├─2df9eaaa2e1576c7ef0baaa85ec87d47ce8f192c1db6446f608b0a00c0b3a645 │ │ └─11068 /pause │ ├─6c01e3193c833e8d5dc9953fedc7006c891b1446d4a8931c1eaee33ac53e9455 │ │ └─11177 /manager --metrics-bind-address=:9782 │ ├─cf88cce314930178e0f6a50c11b12a7bb327ca903fd8dea19809dcc6f5b8db22 │ │ └─11590 /pause │ ├─302313878b697db753ea9921e6aa2469cfaa2d91db37124d780b689accc77de8 │ │ └─8153 /pause │ ├─503a074a7f066cfcfc3f16ae644dfddc7a05ccd2381e8ff66612446ae9b60f0a │ │ ├─21933 python -u /app/sidecar.py │ │ ├─22226 python -u /app/sidecar.py │ │ └─22227 python -u /app/sidecar.py │ ├─1e0ec8fd06ff2d0b8d382cb576ee95bb58f132a63d6dd7feec5db089d3ce8ec4 │ │ └─11865 /pause │ ├─1a65ab820379bd1d05544a4723a35c2cad5a1c1ea7daa55c0cf4c11e24abd9f2 │ │ └─8269 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─53156929df5cb36b2b3a97d59e16d57843f1ff43544aeacb15fce8e77cd95d82 │ │ └─5725 /pause │ ├─865a2c498cc7df7aba66733a4b3416b4ba7ed047e5dc104697b275e21e855c1a │ │ ├─12277 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─15049 haproxy -sf 229 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─908484378d09de201fee61b1b0709d3b8867b5377fff6ad004a8b294ffb5b830 │ │ └─8346 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─ec925804eaa96c1388fe8e6abef592ce6cc17bc492554fb08d5ee32c9acf56b1 │ │ └─8084 /pause │ ├─c127472abd047139ee5a0db817ca355af062019bb1500b738789b973283896ee │ │ └─14854 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─8302622931281768ea60dfe8ff2f6e6d50cbf7306ba556cac0cd103a01770c85 │ │ └─23381 /pause │ ├─274985633b4f0291f9d36332dc3709ebf3217b195ebe11052ce1e718cd544d13 │ │ └─4682 kube-apiserver --advertise-address=199.204.45.116 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─c4902d3d2939c191b1df13701177e82ec4a1fc5c334c2451959638bc6360ea19 │ │ └─5736 /pause │ ├─09e585cca4e1c4d7ca55c8615ba83a234e789d943373daf574cb56826d0280b7 │ │ └─6911 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─5b4b06ed595451fc1cdc041ac0b5a80203dc929c2ed0b148b467b255d04f219a │ │ └─4506 /pause │ ├─27d7aff66e5261b25d4a4c051675de1465ca46691d27b6887aad70386c6cfd94 │ │ └─14476 /bin/memcached_exporter │ ├─4082b5d8d99c6bb1c672fb0a7c29e0765931216a7406319058bb4c6fd44002b0 │ │ ├─6130 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6499 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─6b98ff45b4ae6430991a6d2c851408ced3da8ff569cc71c24d672dc7cb6d9c63 │ │ └─7624 /pause │ ├─2bd8cc5120db1411ea6637a474293ad517717831578fa17bb14ed2542d6fbd0a │ │ └─21336 /pause │ ├─d42a38ccba57fa1ea3648d04b3bec543b64e5894851dc78e29520424e96d5a2c │ │ └─10323 /pause │ ├─ff44ebff673f49cdff8eeec453f611bdb152e7d6a1e7e9a6002507c62f12fd71 │ │ ├─27474 apache2 -DFOREGROUND │ │ ├─27488 (wsgi:k -DFOREGROUND │ │ ├─27489 (wsgi:k -DFOREGROUND │ │ ├─27490 (wsgi:k -DFOREGROUND │ │ ├─27491 (wsgi:k -DFOREGROUND │ │ ├─27493 apache2 -DFOREGROUND │ │ ├─27496 apache2 -DFOREGROUND │ │ ├─27497 apache2 -DFOREGROUND │ │ ├─27498 apache2 -DFOREGROUND │ │ ├─27499 apache2 -DFOREGROUND │ │ ├─27500 apache2 -DFOREGROUND │ │ ├─27502 apache2 -DFOREGROUND │ │ ├─27503 apache2 -DFOREGROUND │ │ ├─27504 apache2 -DFOREGROUND │ │ └─27505 apache2 -DFOREGROUND │ ├─40d8e819be5168364db862bd33d66034bc81a02491c4d4e784cc7f1f2e7552ec │ │ └─10652 /server │ ├─d99978a6a13cec60f935ee0495ee742bbbe10fede1055c4551a27a0662b4a1e4 │ │ └─4833 /kube-vip manager │ ├─bbf7db8ade108e78ee53a112bca314783aa5fbd9a6dc56d1c8685e2337eef91b │ │ └─5978 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─727fbab725bbcd1e3105adb4825130f9733b4d249a63c2f7ba4fe70e49c24880 │ │ └─8114 /pause │ ├─151f66e497e8a53ea61474c6de586d0836533c7011f2bb8837fe22e92ff5b159 │ │ └─4481 /pause │ ├─5207ccc4609645038152a42a6277c924765bee94261b096def53c32609f110f6 │ │ └─21671 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─261e6509bdbfc12909b79d363a48e9fad62218b6ef287d9ca822044930fed3ac │ │ └─11107 /pause │ ├─d6bbe759def6096b5473fc5970ed3b7fae65ae90a7cfcd2caeb8e4131d438016 │ │ └─21379 /pause │ ├─9165a5ba55f4f26617dcf69e6627c225fb47be0280d7d6f251c720432891ee7c │ │ └─22751 /pause │ ├─d013735d4496a95d06805fb4dbeb9f8da16f6c8f543e93037f525cc90a685132 │ │ └─8307 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─0cae0ede3148a7cbae0cb022851b758205988f2f38a8765913f2eb7867dd0bfb │ │ └─4770 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─57ab9a7ee4a6b109ceabdfb2c5c11e6086b00dc8fab562c4a0325beb4ce09fb0 │ │ └─24180 /bin/oauth2-proxy │ ├─5eb23256632aa13949cdde119541057a79e96a4959448b6b8f8d0fe5a23e3f0a │ │ └─11723 percona-xtradb-cluster-operator │ ├─0f44829c0bac92068a40d452735b4a389d6d34438ac8dbc4724547c7ff10bd78 │ │ └─23740 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-116.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─468dc2ea334d7b8e99f5fe49a843d7a3f9a0b3e802d2299d6d31b1648cf1a04a │ │ └─23229 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─fa4e60627fb08290a8b5a944dc72ef75dd07999f3cfc1008bc5894a42fa95936 │ │ ├─12449 mysqld --wsrep_start_position=d9f638b7-3ea9-11f1-8337-1a22bf50ce9e:20 │ │ └─12572 /var/lib/mysql/mysql-state-monitor │ ├─465704758cd0d465b7560560c691b088ead70b0935208e5e91fe717955485e93 │ │ └─5062 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─9b39183c3b6bf1ce63ca67a1561215a9dba481691bfd6d901b19bd2585b7a1a5 │ │ └─14045 /pause │ ├─0c9048d18c09401113eab6fcaee3e730340c6111be5d0e4d501227c0202840a5 │ │ └─24151 /bin/oauth2-proxy │ ├─85b9f634ec1c73cc0e240133ab6d2625ba13b44f00b99064ce1fe869cb6f21fc │ │ └─7263 /pause │ ├─cb6cd4988897cee574fad498ef1bb52c35c9e707c07d5f475c7825d523cdea4e │ │ └─24028 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─84b0a1642b378e667c7f4f1e9829cb0435f3304551238a2bb73668f6a146b4a6 │ │ ├─32009 apache2 -DFOREGROUND │ │ ├─34127 (wsgi:h -DFOREGROUND │ │ ├─34128 (wsgi:h -DFOREGROUND │ │ ├─34129 (wsgi:h -DFOREGROUND │ │ ├─34130 (wsgi:h -DFOREGROUND │ │ ├─34131 (wsgi:h -DFOREGROUND │ │ ├─34132 apache2 -DFOREGROUND │ │ └─34133 apache2 -DFOREGROUND │ ├─00f69ae8fe404c21e5ad3898d48eea614fe34e35a10011aff6499f7aab2479a1 │ │ └─4590 /pause │ ├─055a63065614e8e1c43b5a9d0a04eb52eadc3af454acd7445bd470e7ca6343f7 │ │ └─21246 /pause │ ├─d846d4310d084dd81294ceaa7b4840473071147db3e5d3972c56cfc5ef8dc308 │ │ └─11442 /manager --metrics-bind-address=:8080 │ ├─4aed90274a565cfec9178b77d3dd6b13a096369431ca69da444d7ac018765e0e │ │ └─22363 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─85820a6b63caa014490f3e799e1b5412c1484b4b4b3f763bef3a4df6aa41cedb │ │ └─18607 /secretgen-controller │ ├─1fa7fa5ea95f6bd62a410d4ac4416f1aa651309a822108c32df78c3a27a01e65 │ │ └─23993 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-116.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─7ebec3ca079fa3619c3b5a547ebd904e9bf9e0ad67636a6e373f8064ae5fb839 │ │ └─18560 /pause │ ├─279962353339f6b7fe8133253fdce1a672e12f895e8bd7f33eca62fe04c52647 │ │ ├─23816 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23831 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─23837 erl_child_setup 1048576 │ │ ├─23917 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23918 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23928 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─24072 /bin/sh -s rabbit_disk_monitor │ ├─067985a4e7cbf36f4042668602c86e7dfe9eed3fb68800e36fd1e7b076a641fd │ │ └─24065 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─a9b9b772b085203c156c1dae01dc227370d637053757e131dbe7ac307268829e │ │ └─30517 /pause │ ├─4a0ae0d7365a4d220cd0dfe0cedb4b72885a751d6797d55ff45e821ef0f4d967 │ │ └─4768 etcd --advertise-client-urls=https://199.204.45.116:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.116:2380 --initial-cluster=instance=https://199.204.45.116:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.116:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.116:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─c8e548c8cfa4f3832e76cdc4813d6ff89d2c023fba84fd6ea0dc94ada05da52d │ │ └─7321 /coredns -conf /etc/coredns/Corefile │ ├─51ef062359349e1b0035771cea6466fd8484c57ae5ad4254f79325d560ea6dbb │ │ └─7744 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─30af811b4fe5be6ee28cfa19d1cac02686d3c6d61e1fc6b84bd6e1d719037d67 │ │ └─30569 /pause │ ├─b488b119129ff4620f114a103a429f15d1d88a023f40ece29db9ef7ffb6c4ec6 │ │ └─14409 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─7d31020c4f42f7f4b422153fcc6ab1e43a5c295c334f3f567f9539debd4fac65 │ │ └─10408 /pause │ ├─e7d4b21585b6b0c937306c074c1061368e9835e4842b2422ed6d98949a87a646 │ │ └─14652 /pause │ ├─3b6c7dd0149f769b4c55e6ba5323ccbd0d25a888d8fc5e8841db1bd70845c20a │ │ └─12349 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─7e504a55b10e14dae2fe253e40990407043e8aa16b877f76709cd785f7cd718b │ │ └─4718 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─a846f99d9a785ac57039600fe70fc24f29d91f22c2f47e92a303ecf08e3bb63c │ │ └─21428 /pause │ ├─871eb349d8eeb68ba6b96f4f77315d049a186238d2356eb708033b81618d7867 │ │ └─4623 /pause │ ├─b7fa3d26632646fe4bdc434a0312bd7eea9a546ed51d57b13903c648a934fe10 │ │ └─25130 /pause │ ├─d997ea6aff59722bc9b2309e738972e3806c084a712d1b25aa9d0feb1d2781ef │ │ └─12547 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─b442d76ebe51ca5ea4e66959e321d089bf4ddc293f29d77637e7d87bfaa2d1dd │ │ ├─31988 apache2 -DFOREGROUND │ │ ├─33935 (wsgi:h -DFOREGROUND │ │ ├─33936 (wsgi:h -DFOREGROUND │ │ ├─33937 (wsgi:h -DFOREGROUND │ │ ├─33938 (wsgi:h -DFOREGROUND │ │ ├─33939 (wsgi:h -DFOREGROUND │ │ ├─33940 apache2 -DFOREGROUND │ │ └─33941 apache2 -DFOREGROUND │ ├─134ac6744fa8f496b769ec575602229aacd0e478f2f0ca616a911c8b7a55f0d9 │ │ └─22896 /pause │ ├─f57939645716bb170118980ce97837d14cd102c8d85bd94382b1c9df8e719911 │ │ └─23773 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─00e0da9723026cb211a5ee90d0701b8ad6eb1321cc47403b5f139f74c86a86b5 │ │ └─12251 /pause │ ├─e09632a9cf7023a09834f886d60394128165c56c2c0acca4d242d0e7fd1836bc │ │ └─4602 /pause │ ├─5d6b2dd3ec83f2e1477e770d354522f86b084e8c54fec98f930d60a3018ab044 │ │ ├─21907 python -u /app/sidecar.py │ │ ├─22151 python -u /app/sidecar.py │ │ └─22152 python -u /app/sidecar.py │ └─09d870dad1d436d6a528a1093494a09fd4053594a1a03543a55f61b070f06754 │ ├─10609 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ ├─10621 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ ├─10705 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ ├─31598 nginx: worker process │ ├─31599 nginx: worker process │ └─31600 nginx: cache manager process ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount