Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─632 /lib/systemd/systemd --user │ │ └─633 (sd-pam) │ ├─session-4.scope │ │ ├─1388 sshd: zuul [priv] │ │ └─1401 sshd: zuul@notty │ └─session-1.scope │ ├─ 629 sshd: zuul [priv] │ ├─ 646 sshd: zuul@notty │ ├─ 789 /usr/bin/python3 │ ├─ 1392 ssh: /home/zuul/.ansible/cp/199.204.45.242-22-zuul [mux] │ ├─35349 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-hckzweayzuxojhpkasadxqwavrsziupt ; /usr/bin/python3'"'"' && sleep 0' │ ├─35350 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-hckzweayzuxojhpkasadxqwavrsziupt ; /usr/bin/python3' && sleep 0 │ ├─35351 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-hckzweayzuxojhpkasadxqwavrsziupt ; /usr/bin/python3 │ ├─35352 /bin/sh -c echo BECOME-SUCCESS-hckzweayzuxojhpkasadxqwavrsziupt ; /usr/bin/python3 │ ├─35353 /usr/bin/python3 │ ├─35354 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─35356 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2910 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4487 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f0ae97de83b6eb1ad09e3322fcf6bf8abe4b82b2860d4cf219bedbc2587f119e -address /run/containerd/containerd.sock │ │ ├─ 4501 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cfb0e51ee0a60f5c7f9758866cc1a22e2d611b660fa42fe68334028332dd46cb -address /run/containerd/containerd.sock │ │ ├─ 4523 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5f7ea409c471d4f555a5912a53f12a5f0bd4eb40d6f659f661bd8ebea79602b6 -address /run/containerd/containerd.sock │ │ ├─ 4535 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7e7bb602533c5b63077f287af94dffb4f4b4ab9ca9ec96b816de6419d40ad727 -address /run/containerd/containerd.sock │ │ ├─ 4551 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e9da43d7bf2c242e7929f54b113dfee820a5d16066d719aa17712c619dd883d1 -address /run/containerd/containerd.sock │ │ ├─ 5061 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 69641592756db8f9b94b834cfcc053b874915ea9fc9403e679da9445c487c173 -address /run/containerd/containerd.sock │ │ ├─ 5732 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e61e535253ef2f023bbc342c4f47538025250d70fb4c412d4636d07a633039c3 -address /run/containerd/containerd.sock │ │ ├─ 5780 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f99ca7e4c016b67d8f80173f964de03f31dbe77fcd2d0560497a1b78c51bc6f6 -address /run/containerd/containerd.sock │ │ ├─ 7121 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c1a38475aafe13cb0f0eeb7cbc345e2d0f9dac118e9493fb76c49477c83f4531 -address /run/containerd/containerd.sock │ │ ├─ 7536 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3588200631b0e660e115b91ce78cb728ce1e7520bea3f9695c202ebf89d886fd -address /run/containerd/containerd.sock │ │ ├─ 7573 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f161cec84ac0126bfe690888cb88fbcde69758a1aa28d5ef06fdfe060205b9ba -address /run/containerd/containerd.sock │ │ ├─ 7910 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id efb007698f96a56c310e6b34d0275af81276af149db5728018e7ba1af68e4526 -address /run/containerd/containerd.sock │ │ ├─ 8357 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8e5ce5f2b78bf4db4b70f8cb095f027781da041aaf8dac7e2224f89f9ec45c98 -address /run/containerd/containerd.sock │ │ ├─ 8404 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cf2b1af724ca7c7ee88a1fcdcc4a2710b43d1a4f19591b51269fe687d094f4c0 -address /run/containerd/containerd.sock │ │ ├─ 8442 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d36e7cb8ba520565ad8469155c7d1f99fe6789fbea2eae1fc449088dbaae668d -address /run/containerd/containerd.sock │ │ ├─10414 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bdc9eb885e7cc67e24409521cb9166380769474672a53561cc9f6c0a729d47f1 -address /run/containerd/containerd.sock │ │ ├─10501 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d12a155510e619074a4468410bd95dd5c185f95254b08885b63f10995057a5e5 -address /run/containerd/containerd.sock │ │ ├─11134 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bdabc85a49b51b2d86290624540b3efe7a9efa9199dccc0e7eea202b035f455b -address /run/containerd/containerd.sock │ │ ├─11228 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3ebf6d0407edf21808b33b2d318c78389b8e34640a1f63837d875af5e946c5f4 -address /run/containerd/containerd.sock │ │ ├─11528 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 91ac0d0aa4b90f7608f671bd65da100f23e334290a796bde1926f95f8c3c17d9 -address /run/containerd/containerd.sock │ │ ├─11821 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 989c56fcf3e841227c05d9524d549523883fdca2b49a368b4f450d7d6df4a7d1 -address /run/containerd/containerd.sock │ │ ├─12125 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1ce178c606532ded14726013f7b688274afc5d7669c10a2377284975314ca710 -address /run/containerd/containerd.sock │ │ ├─14132 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f36a37968ab4415bff005ad404058fb1a72ce1860075373af4ca76bc5bcee440 -address /run/containerd/containerd.sock │ │ ├─14786 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0ff4c4ca32ef78f66cea6bb08e997c50d7e3f150c344205e0c2868ea4b3accb7 -address /run/containerd/containerd.sock │ │ ├─18693 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9686e4121e223046b1a7f1ab16449ae28e04cc3d8fc91eb1aa27a555d80be315 -address /run/containerd/containerd.sock │ │ ├─21485 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5e6b84604a2003b5b009117e50a2a8907a93737e2510f424d7cebf658f302472 -address /run/containerd/containerd.sock │ │ ├─21529 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8b968dac96820acb3305117f3d64f99afc823ec54c19948cb475d9773a5837b7 -address /run/containerd/containerd.sock │ │ ├─21569 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f417b9a0ea961457157aeac1c9eace967ce3c9723b6927ebfe8867fe7cddf58c -address /run/containerd/containerd.sock │ │ ├─21621 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5c32e0a8c5b1010ece8f8a3a6bec4214e9c8c1c8522c576216f755155fa11062 -address /run/containerd/containerd.sock │ │ ├─22677 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 36eafa88455fe46f7b2a682afe758acc335594de971a79cff31e0f18a276be31 -address /run/containerd/containerd.sock │ │ ├─22719 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 484319208282952be07698d1d273e92b4e838dca6a12bbce3b2f56e8c08649dc -address /run/containerd/containerd.sock │ │ ├─23754 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id adeec4056714c0846caac63753ef53d93cfb4edc411437106284421be78744b6 -address /run/containerd/containerd.sock │ │ └─25237 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 56cd36d657e3e19b489e44cf2a876e22f5d7ec4f4b7c75f1303fc2ddae41819a -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1120 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─431 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─322 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─533 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─557 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─526 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4927 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.242 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─291 /lib/systemd/systemd-journald │ ├─ssh.service │ │ ├─ 561 sshd: /usr/sbin/sshd -D [listener] 1 of 10-100 startups │ │ ├─35288 sshd: root [priv] │ │ └─35289 sshd: root [net] │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1320 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─326 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─523 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─327 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─532 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─529 /lib/systemd/systemd-logind ├─k8s.io │ ├─929331851858dcba88bb514fdbd1c64384ab09996c71f635d12a8b6498cbd2fd │ │ ├─10730 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10743 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10842 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─29948 nginx: worker process │ │ ├─29949 nginx: worker process │ │ └─29950 nginx: cache manager process │ ├─92658b75f1a14b8514dbba96d872b534ced16ba67773872d07615556b01e91ed │ │ └─5110 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─3122046626d41279c8017a69c023aa0c36d4a32af7c63f7fa4d76b5e7973fdf0 │ │ └─11667 percona-xtradb-cluster-operator │ ├─3d50929474f2e9df5b908ba83aae77bd1a3998a709f8e4c316114119736ccc29 │ │ └─23917 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-242.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─71889ae23136b4b1bb80294e5f588978540ee750b7fe9550a4b25f7d257b83cf │ │ └─4778 etcd --advertise-client-urls=https://199.204.45.242:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.242:2380 --initial-cluster=instance=https://199.204.45.242:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.242:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.242:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─5dc6394fb49716b3d2c22be247b0765b62ead0d0dff7ef23bbcf2674d7e22d34 │ │ └─12618 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─ae170e081c7f393f12696da390f9a25758abb1ee222f2e83444ac72c7cf1c5ff │ │ └─7661 /coredns -conf /etc/coredns/Corefile │ ├─c73d5ff31bdde1331b76959936ae10f865905d4b08c266736db61cad30b4e2dd │ │ ├─27521 apache2 -DFOREGROUND │ │ ├─27537 (wsgi:k -DFOREGROUND │ │ ├─27538 (wsgi:k -DFOREGROUND │ │ ├─27539 (wsgi:k -DFOREGROUND │ │ ├─27540 (wsgi:k -DFOREGROUND │ │ ├─27541 apache2 -DFOREGROUND │ │ ├─27543 apache2 -DFOREGROUND │ │ ├─27546 apache2 -DFOREGROUND │ │ ├─27548 apache2 -DFOREGROUND │ │ ├─27551 apache2 -DFOREGROUND │ │ ├─27552 apache2 -DFOREGROUND │ │ ├─27553 apache2 -DFOREGROUND │ │ ├─27554 apache2 -DFOREGROUND │ │ ├─27555 apache2 -DFOREGROUND │ │ └─27556 apache2 -DFOREGROUND │ ├─bcb05a32395855af14bdf20a8a8256ef91fc5c45530fdd0338c43b456d5bf2bd │ │ └─4726 kube-apiserver --advertise-address=199.204.45.242 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─7ccb5356fc5a7ef110ea30a46086bd9d0ee30384e2f0fcbc11ce47f5cd1dc5f6 │ │ └─24520 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─989c56fcf3e841227c05d9524d549523883fdca2b49a368b4f450d7d6df4a7d1 │ │ └─11845 /pause │ ├─f99ca7e4c016b67d8f80173f964de03f31dbe77fcd2d0560497a1b78c51bc6f6 │ │ └─5804 /pause │ ├─fca13bc9149e5235178aa2243e69fce562a103922983170e276944d9540acdc9 │ │ ├─22479 python -u /app/sidecar.py │ │ ├─22612 python -u /app/sidecar.py │ │ └─22613 python -u /app/sidecar.py │ ├─f161cec84ac0126bfe690888cb88fbcde69758a1aa28d5ef06fdfe060205b9ba │ │ └─7602 /pause │ ├─2f998e51573c9a7c4ea9e5fa64cf39ccb876daa293a2e85c5327a6bf16656408 │ │ ├─24241 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─24258 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-13.2.2.11/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -enable-feature maybe_expr │ │ ├─24264 erl_child_setup 1048576 │ │ ├─24358 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─24359 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─24369 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/epmd -daemon │ │ └─24459 /bin/sh -s rabbit_disk_monitor │ ├─56cd36d657e3e19b489e44cf2a876e22f5d7ec4f4b7c75f1303fc2ddae41819a │ │ └─25261 /pause │ ├─0ff4c4ca32ef78f66cea6bb08e997c50d7e3f150c344205e0c2868ea4b3accb7 │ │ └─14809 /pause │ ├─8634b97b1163287b4ab93066ba7c2ecb323884231ac2ab249298ca86b74e2046 │ │ ├─22454 python -u /app/sidecar.py │ │ ├─22610 python -u /app/sidecar.py │ │ └─22611 python -u /app/sidecar.py │ ├─7e7bb602533c5b63077f287af94dffb4f4b4ab9ca9ec96b816de6419d40ad727 │ │ └─4640 /pause │ ├─e61e535253ef2f023bbc342c4f47538025250d70fb4c412d4636d07a633039c3 │ │ └─5756 /pause │ ├─a8adc60228b2fed281c1e84395745656acd2b2a3c18a0e4a48e93286104b1ade │ │ └─24326 /bin/oauth2-proxy │ ├─cf2b1af724ca7c7ee88a1fcdcc4a2710b43d1a4f19591b51269fe687d094f4c0 │ │ └─8428 /pause │ ├─8e5ce5f2b78bf4db4b70f8cb095f027781da041aaf8dac7e2224f89f9ec45c98 │ │ └─8383 /pause │ ├─4d760148329a757daa6e7e6edeafc13c39b2413e4e3a9700f24df072b55bab9d │ │ └─8177 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─3a25d2eb2add8b7790e5c714626329d9eab1fe6af2318e1d89fbaa2f936852e5 │ │ └─8615 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─36eafa88455fe46f7b2a682afe758acc335594de971a79cff31e0f18a276be31 │ │ └─22702 /pause │ ├─52bcfe19a4bae1b6e367a828f7794c19ce7720baeead5bb985e2fe373b87ab4f │ │ ├─12425 mysqld --wsrep_start_position=f6c58d18-3a8c-11f1-a905-cbed61a5d558:20 │ │ └─12550 /var/lib/mysql/mysql-state-monitor │ ├─f8949d0ff3c896f2d2c1e010469c868a0c3c191c5e3f3e898a874f65fe4d8222 │ │ └─23991 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─02cc793216703469d0a091356a49b0b0ae98ee50bd2e1a9ed068c53a958cbb64 │ │ └─11400 /manager --metrics-bind-address=:8080 │ ├─4a1f80dd08370b89f69ba6d948a45700775b28a6e4c290103745d6a4f4161f9f │ │ └─7181 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─5e92ae6c1580b74aa530ac3f919bbd0abf354b54bca80dc18898d195ab0b0e0a │ │ └─6183 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─f36a37968ab4415bff005ad404058fb1a72ce1860075373af4ca76bc5bcee440 │ │ └─14156 /pause │ ├─d96ed8ad0dd5d424be4becb0a8c6e5e82e08ad37024fbd403dc03619d57e7a6d │ │ └─23724 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-242.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─d12a155510e619074a4468410bd95dd5c185f95254b08885b63f10995057a5e5 │ │ └─10527 /pause │ ├─953ea549bd2cfab67dd2bb39f141f261ddac1809f69645a15bd1e6c9ca54aa51 │ │ └─10774 /server │ ├─34bd00e44af90bd3df1747083ec6b2fbe85ffa061d40dd7e9b1ee6829b017eaf │ │ └─4875 /kube-vip manager │ ├─f417b9a0ea961457157aeac1c9eace967ce3c9723b6927ebfe8867fe7cddf58c │ │ └─21593 /pause │ ├─03c72ce3086fb9dc52b94d267bea83ebc059125b2e399860ead631c972a41ff6 │ │ └─23779 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─8b968dac96820acb3305117f3d64f99afc823ec54c19948cb475d9773a5837b7 │ │ └─21553 /pause │ ├─ef4a7f9aaad8dea22f21bdb0f9af7017961abd51eb3706ad2a34a7912a64e33e │ │ └─4745 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─d0fb3af8c58684a918e01e85348d819dded822b8888d7cffcc3f20592f94bdb3 │ │ └─12522 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─5c32e0a8c5b1010ece8f8a3a6bec4214e9c8c1c8522c576216f755155fa11062 │ │ └─21666 /pause │ ├─c1a38475aafe13cb0f0eeb7cbc345e2d0f9dac118e9493fb76c49477c83f4531 │ │ └─7145 /pause │ ├─5f7ea409c471d4f555a5912a53f12a5f0bd4eb40d6f659f661bd8ebea79602b6 │ │ └─4637 /pause │ ├─79dda1df2b55a85c9b32a22ecc15c79dfacee6b63977d0bf54e3ad36c9043942 │ │ └─7646 /coredns -conf /etc/coredns/Corefile │ ├─5e6b84604a2003b5b009117e50a2a8907a93737e2510f424d7cebf658f302472 │ │ └─21510 /pause │ ├─3588200631b0e660e115b91ce78cb728ce1e7520bea3f9695c202ebf89d886fd │ │ └─7567 /pause │ ├─8d14b369fed50d0780c17d837bdfceb30c78d89faff59f616b11d51e22276c3b │ │ └─23952 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─9686e4121e223046b1a7f1ab16449ae28e04cc3d8fc91eb1aa27a555d80be315 │ │ └─18718 /pause │ ├─5eaaa1e558185a9f6d3f90f2873a7c8a21312a9ac27c1731334e791a2ac14b91 │ │ └─4776 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─1df04551b178d4991bf9f30cf60c58f0b6db607d2ed099cb0a8e5c80bb23cf1f │ │ └─22968 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─69641592756db8f9b94b834cfcc053b874915ea9fc9403e679da9445c487c173 │ │ └─5084 /pause │ ├─6e4635330b16869f8697b5cf99f3e942120767c291942de9bb594a9e2dc7c8fb │ │ └─14535 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─dfc7254c61c1eda81fcd2cbf09ed75584f2ae748285c2273b3cd7ece19d55b98 │ │ └─23364 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─1ce178c606532ded14726013f7b688274afc5d7669c10a2377284975314ca710 │ │ └─12153 /pause │ ├─46eac614a085bac12e7c84f67200c40889799378b326964ee3919b4612b325a7 │ │ └─14929 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─47086ce96073ae04a9c70a900b4ed725c5337a7579a1fe4806e6b8c0d7553ca7 │ │ └─14605 /bin/memcached_exporter │ ├─bdc9eb885e7cc67e24409521cb9166380769474672a53561cc9f6c0a729d47f1 │ │ └─10453 /pause │ ├─ecff44aa073a756a6345d3b49807378825d0283ededff46cb6dd28cdca085ac8 │ │ └─24308 /bin/oauth2-proxy │ ├─fca967b5a6d991495e75f336717d970d29f5b6014206c8231aac7bcbd8b033b3 │ │ ├─6388 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6750 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─54812caec35be3dd1834c6f52a39d12c58c6cb0aefa9e76989daef3340e02dea │ │ └─22165 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─91ac0d0aa4b90f7608f671bd65da100f23e334290a796bde1926f95f8c3c17d9 │ │ └─11551 /pause │ ├─e9da43d7bf2c242e7929f54b113dfee820a5d16066d719aa17712c619dd883d1 │ │ └─4660 /pause │ ├─484319208282952be07698d1d273e92b4e838dca6a12bbce3b2f56e8c08649dc │ │ └─22740 /pause │ ├─f0ae97de83b6eb1ad09e3322fcf6bf8abe4b82b2860d4cf219bedbc2587f119e │ │ └─4582 /pause │ ├─8fb7b4bf96dbd00ec40ea45bd69e03862d6d67d0e88d27d0801691181f728b24 │ │ └─8653 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─8f1e0a12c1f74a74b347a866c8b28509b13d665aa698c7f3042e3e0b648bb885 │ │ └─18757 /secretgen-controller │ ├─adeec4056714c0846caac63753ef53d93cfb4edc411437106284421be78744b6 │ │ └─23796 /pause │ ├─cfb0e51ee0a60f5c7f9758866cc1a22e2d611b660fa42fe68334028332dd46cb │ │ └─4606 /pause │ ├─bdabc85a49b51b2d86290624540b3efe7a9efa9199dccc0e7eea202b035f455b │ │ └─11159 /pause │ ├─36b41b779bd3cefc47c8ea4035a521f57e311593cc0c6d7c17616e2f09a4ba95 │ │ └─21703 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─77ae82beb35cde7e2e6f43cc995fde7d8dae295e6a78df70566876ca1dcfb681 │ │ ├─12277 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─15159 haproxy -sf 253 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─3ebf6d0407edf21808b33b2d318c78389b8e34640a1f63837d875af5e946c5f4 │ │ └─11252 /pause │ ├─efb007698f96a56c310e6b34d0275af81276af149db5728018e7ba1af68e4526 │ │ └─7935 /pause │ ├─2c583edbf637b06c80674ca1dba28b52da14d3ab2c5b6e151e98a94e48436301 │ │ └─11300 /manager --metrics-bind-address=:9782 │ ├─d36e7cb8ba520565ad8469155c7d1f99fe6789fbea2eae1fc449088dbaae668d │ │ └─8464 /pause │ └─4f08a83d73847294c714cfe7ea5bb01d07960b0c75cdc0f20e338ccefc4fb626 │ └─8576 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount