Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-22.scope │ │ ├─50489 sshd: zuul [priv] │ │ └─50521 sshd: zuul@notty │ ├─session-8.scope │ │ ├─9508 sshd: zuul [priv] │ │ └─9521 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 633 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 9512 ssh: /home/zuul/.ansible/cp/f99d71bc48 [mux] │ ├─50493 ssh: /home/zuul/.ansible/cp/199.19.213.29-22-zuul [mux] │ ├─50965 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-tcgvonzunsdueyenivthtfijqlcxvumg ; /usr/bin/python3'"'"' && sleep 0' │ ├─50966 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-tcgvonzunsdueyenivthtfijqlcxvumg ; /usr/bin/python3' && sleep 0 │ ├─50967 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-tcgvonzunsdueyenivthtfijqlcxvumg ; /usr/bin/python3 │ ├─50968 /bin/sh -c echo BECOME-SUCCESS-tcgvonzunsdueyenivthtfijqlcxvumg ; /usr/bin/python3 │ ├─50969 /usr/bin/python3 │ ├─50970 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─50972 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 3030 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4603 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d49d4f22a4f5d3cec9cf0e73392ecde00a53d81372eebd020a2d5e7a98df0ce0 -address /run/containerd/containerd.sock │ │ ├─ 4612 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a86e36d6ba031be6ee45a105ef5792cfb296cdf7db45e453e3a74082cf887d09 -address /run/containerd/containerd.sock │ │ ├─ 4651 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 77e92dfdc75cb48a1bd8289bd22caa9ccb794b029f42df2dc634ef087871dd09 -address /run/containerd/containerd.sock │ │ ├─ 4667 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e9111d6882fdd8606bcca3e1b7dacbafa938e973fa0b8b7177471ac2bc8463ae -address /run/containerd/containerd.sock │ │ ├─ 4670 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f9ee332f615d3036dfd1f5e1886b126cb15cbe2242f165a648a4f43a2ec2b5d1 -address /run/containerd/containerd.sock │ │ ├─ 5174 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 96ebbb65c5167ef862dcfbe3d16409744e43a6491b13c0981f8ae71e08879ad2 -address /run/containerd/containerd.sock │ │ ├─ 5835 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 46a64923d682eae317060980a158fc3aa23a3bc75f49d87b97b658d84cf90c62 -address /run/containerd/containerd.sock │ │ ├─ 5861 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1ac0b523763b93a12999590ac7c3412cdddde732a2129ea1f3c31391b5069cd8 -address /run/containerd/containerd.sock │ │ ├─ 7605 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a74698c30ab15fca5681805a413a7a901062e56853b7a3396eb2340f8724bfd1 -address /run/containerd/containerd.sock │ │ ├─ 7952 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c117bb9b13b6c3a48987248177414ee579ac6423f17597f09cd7a3f64a78d54b -address /run/containerd/containerd.sock │ │ ├─ 8002 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5da5495dc694ae9ee1f91cbac858427d4b87e067a9f064875c44f8206f8b8c72 -address /run/containerd/containerd.sock │ │ ├─ 8356 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e46562a38ef9ee3d51e200bbda1aed59d3fb820d1d9da9cb763136429c9ec47f -address /run/containerd/containerd.sock │ │ ├─17119 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9e042c9b736ef9f9a9339b2078d3a4f7910779b979ea3a491a983ab380eb0ef7 -address /run/containerd/containerd.sock │ │ ├─17299 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id edbb18e364951fd5f9c40cc17f98f475498458c81cb590f7e8e45aee5e883d02 -address /run/containerd/containerd.sock │ │ ├─17339 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 519fbf00fa73a5f4c983077feb32b95eae2eb5c90e0a30bc9e9d4b97f75f9899 -address /run/containerd/containerd.sock │ │ ├─17384 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e72b0d5d92d6d41e29d2a533e4d440266877c5f776ef80810a84fbdb6be13414 -address /run/containerd/containerd.sock │ │ ├─17923 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0db60e4310a57e5f8e24a3f31e4dfa9515c9a57d25c7714d251a9bf64c6055c7 -address /run/containerd/containerd.sock │ │ ├─17969 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a092868fb9971b9a255f1ac6149a88d0d739c1d8917641cce1620a1ee6743832 -address /run/containerd/containerd.sock │ │ ├─21020 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id abe00cf3e6a91d2eae775403bc5d679a776aa83207c20b08abb2f761e014349f -address /run/containerd/containerd.sock │ │ ├─21145 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fd3edb280d0d18acfb63de5fd008863cf4dc19a862faa06cb1bae3f18b24fc0f -address /run/containerd/containerd.sock │ │ ├─21266 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fe8adb0893844438b623f317ba3a10c08d1a4d1cffbe37dcab7b268e0b1faf04 -address /run/containerd/containerd.sock │ │ ├─22104 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8697220cfd52067cf03f59fd962673c2125be300963de977383a525f36b7f4aa -address /run/containerd/containerd.sock │ │ ├─22570 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a42c6b560448718b8c2e3750506a949334f98b4ab3a513ea534cf321aa9512a8 -address /run/containerd/containerd.sock │ │ ├─22654 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f27571ac0533fa042acbdc38fc6c82c692b9fae99534ffd7e9408eeb39cb392a -address /run/containerd/containerd.sock │ │ ├─25804 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 426cfd9700dabc56dc860702f451c75d035e5ebd0919c3510f01d7ef46240dde -address /run/containerd/containerd.sock │ │ ├─31583 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7ad5655cea5ff68b2c7e1e50c7e48fcc4614f044e0bc5f1904358d8f210a82d5 -address /run/containerd/containerd.sock │ │ ├─32504 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7799f61cf2592b9311743a5f0153efcbfdd3759228c2e814bdaf9a702fc1f660 -address /run/containerd/containerd.sock │ │ ├─35129 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a34d6cddf83bd320ddd0da96ef3201152c6b3b7d98ec33b39fc5ae9cfcae4861 -address /run/containerd/containerd.sock │ │ ├─40012 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6eb4cea0917f7d0a3b2a25b3bc19b62046cf9295c3b3fbfe84d00052ebae066a -address /run/containerd/containerd.sock │ │ ├─40125 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c6fd62092fe59ac2cdc1b1514ff992daae1a1a16d18cbe1fc6999949f64e68b1 -address /run/containerd/containerd.sock │ │ ├─40165 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5c85f97670875e4f43670550ba99c4e88caef1aa57c474673eee49fcda11136a -address /run/containerd/containerd.sock │ │ ├─40224 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 39e0f56b479e735971972a0d173e61510738d53207738ed2ffca5665bf062fe6 -address /run/containerd/containerd.sock │ │ ├─41448 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5814305f7c490141a9c1f4442127be45e82559af378f3138753b6ddccef4399c -address /run/containerd/containerd.sock │ │ ├─41532 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 047eca4d0243d1d67ef47e6c94e27a0306227c50b3fe6e719eb7be0d51549d2f -address /run/containerd/containerd.sock │ │ ├─46460 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1b354440eeb8c937f76d2d4408e65544ee762d6dddb59e183086aec428a0bb7b -address /run/containerd/containerd.sock │ │ ├─46501 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 10761924c19b2b2713a3522ce1f93c5922bd0192a55d1d5914160379006712c6 -address /run/containerd/containerd.sock │ │ └─46646 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d07701a911f53d23ee3927df32dec08da92685172a89048549f18ee157f82a22 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1093 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─540 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─559 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─534 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─5036 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.29 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ ├─ 565 sshd: /usr/sbin/sshd -D [listener] 3 of 10-100 startups │ │ ├─44033 sshd: [accepted] │ │ ├─44069 sshd: [net] │ │ ├─47632 sshd: [accepted] │ │ └─50136 sshd: [accepted] │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1447 /usr/sbin/uuidd --socket-activation │ ├─systemd-resolved.service │ │ └─330 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─530 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─332 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─539 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─536 /lib/systemd/systemd-logind ├─k8s.io │ ├─8697220cfd52067cf03f59fd962673c2125be300963de977383a525f36b7f4aa │ │ └─22130 /pause │ ├─92ec8ed2e4e74bb3595bafb447754042a38d56cfeecb4bd5b6c2693705635953 │ │ ├─41119 python -u /app/sidecar.py │ │ ├─41395 python -u /app/sidecar.py │ │ └─41396 python -u /app/sidecar.py │ ├─e950a788d1df15091d9e015ccd52482101dba8f7be8b46d9d944aba167ed9dfb │ │ └─4861 etcd --advertise-client-urls=https://199.19.213.29:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.29:2380 --initial-cluster=instance=https://199.19.213.29:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.29:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.29:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─f9ee332f615d3036dfd1f5e1886b126cb15cbe2242f165a648a4f43a2ec2b5d1 │ │ └─4780 /pause │ ├─c82e609d2c51c38bde277318acd314c26573a0ca7865032b07253ad94d84f2fe │ │ └─18496 /bin/memcached_exporter │ ├─fe8adb0893844438b623f317ba3a10c08d1a4d1cffbe37dcab7b268e0b1faf04 │ │ └─21290 /pause │ ├─2e0fdddae6c70d7a9c8009ee4bc40b42b0d544eda446455c908bb58294391096 │ │ └─41980 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-29.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─a34d6cddf83bd320ddd0da96ef3201152c6b3b7d98ec33b39fc5ae9cfcae4861 │ │ └─35151 /pause │ ├─519fbf00fa73a5f4c983077feb32b95eae2eb5c90e0a30bc9e9d4b97f75f9899 │ │ └─17374 /pause │ ├─0c2b9e0208782bab718798a27cf8d1effa53806d256ce2b488322a6970afd1e4 │ │ ├─39027 apache2 -DFOREGROUND │ │ ├─39041 (wsgi:k -DFOREGROUND │ │ ├─39042 (wsgi:k -DFOREGROUND │ │ ├─39043 (wsgi:k -DFOREGROUND │ │ ├─39044 (wsgi:k -DFOREGROUND │ │ ├─39045 apache2 -DFOREGROUND │ │ ├─39049 apache2 -DFOREGROUND │ │ ├─39052 apache2 -DFOREGROUND │ │ ├─39054 apache2 -DFOREGROUND │ │ ├─39055 apache2 -DFOREGROUND │ │ ├─39056 apache2 -DFOREGROUND │ │ ├─39057 apache2 -DFOREGROUND │ │ ├─39058 apache2 -DFOREGROUND │ │ ├─39059 apache2 -DFOREGROUND │ │ └─39060 apache2 -DFOREGROUND │ ├─667226aa08bf1bdd4bdfd4248d352e80f6bcea233dc1cfd483e77aee3f48971b │ │ └─42219 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─fb9a208f2f72834940988e05f09c533ab9ad629de8de9e84a03d7db9fd31fd3c │ │ └─5224 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─bee6772cf2115ce14bbd368411d598c0cf7e9cdf98e2072fe89433459392f6d2 │ │ └─42013 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─96ebbb65c5167ef862dcfbe3d16409744e43a6491b13c0981f8ae71e08879ad2 │ │ └─5198 /pause │ ├─77e92dfdc75cb48a1bd8289bd22caa9ccb794b029f42df2dc634ef087871dd09 │ │ └─4755 /pause │ ├─d2fbe94c29297b89e3a8c5051cbafb8a1a7ccaa5cce0dc6a6204a6458ed2c3ab │ │ ├─22846 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─24832 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─96984be5cb708500de73d1d690d36afba61377cd147f005a479bf79989f43cba │ │ └─8466 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─eef2ef0ba747aba62c140e0f4f459ae09969e7dcc24de2a7fd42896e751a2cf5 │ │ └─42147 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-29.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─e5afd9e2077839beb21af8be6cc1faa8ebdc087922dcc984e8186b1f5aad0dc0 │ │ └─21755 percona-xtradb-cluster-operator │ ├─e46562a38ef9ee3d51e200bbda1aed59d3fb820d1d9da9cb763136429c9ec47f │ │ └─8381 /pause │ ├─e72b0d5d92d6d41e29d2a533e4d440266877c5f776ef80810a84fbdb6be13414 │ │ └─17406 /pause │ ├─01df0c81ecc8c1df95282524f5b2883a8543584da0a04ecf4fe87df130810a67 │ │ └─25982 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─d49d4f22a4f5d3cec9cf0e73392ecde00a53d81372eebd020a2d5e7a98df0ce0 │ │ └─4703 /pause │ ├─2dc0fc5bb3444d96bd9adebf085f399be1769aec75da06483d153518111538b9 │ │ ├─33042 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─33059 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─33065 erl_child_setup 1048576 │ │ ├─33102 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─33103 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─33113 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─33185 /bin/sh -s rabbit_disk_monitor │ ├─8fee9bc73cf683af7aa9d54d6143fc4f46bb9c20378204d7bec8978c77fa5731 │ │ └─41712 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─267faebc44ad6fce254cf7f56c7fdf4e90e0f23960a828f87bfc717512bbea62 │ │ ├─6888 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─7214 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─5814305f7c490141a9c1f4442127be45e82559af378f3138753b6ddccef4399c │ │ └─41473 /pause │ ├─ba515dbad262f1111a84dbbcea794a88196071e495f504a31e0edcad979692aa │ │ └─42299 /bin/oauth2-proxy │ ├─37e8081b20f17240a4a9ac925012e222b96ed74a5d2aab1f91abc736102633b2 │ │ ├─48440 apache2 -DFOREGROUND │ │ ├─50150 (wsgi:h -DFOREGROUND │ │ ├─50151 (wsgi:h -DFOREGROUND │ │ ├─50152 (wsgi:h -DFOREGROUND │ │ ├─50153 (wsgi:h -DFOREGROUND │ │ ├─50154 (wsgi:h -DFOREGROUND │ │ ├─50155 apache2 -DFOREGROUND │ │ └─50156 apache2 -DFOREGROUND │ ├─9e042c9b736ef9f9a9339b2078d3a4f7910779b979ea3a491a983ab380eb0ef7 │ │ └─17150 /pause │ ├─5c85f97670875e4f43670550ba99c4e88caef1aa57c474673eee49fcda11136a │ │ └─40197 /pause │ ├─e4590491cbda96e5611e0b7224506e33f3298387e44bc1462d7514e44cc7d74a │ │ └─23215 redis_exporter │ ├─934944a3750aba7c3423eaf29970ff67aebc71077d87ae3b91e11860b3668e97 │ │ └─4990 /kube-vip manager │ ├─5e5aac9023f98cb06af6a1cc952eb5dae89bbfcb31cd5ae2c4d90dfc25b1f0a6 │ │ └─4900 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─5da5495dc694ae9ee1f91cbac858427d4b87e067a9f064875c44f8206f8b8c72 │ │ └─8039 /pause │ ├─23238911131ce2fe5ecc405536f810df599eb971ea32fc2efe8a5d8f431f73b1 │ │ └─22204 /manager --metrics-bind-address=:8080 │ ├─047eca4d0243d1d67ef47e6c94e27a0306227c50b3fe6e719eb7be0d51549d2f │ │ └─41555 /pause │ ├─b5ce779ed0d5ce2d96e8e2f9f073d457ddf15bc88b95030c737ba04e7aa53d58 │ │ ├─41155 python -u /app/sidecar.py │ │ ├─41417 python -u /app/sidecar.py │ │ └─41419 python -u /app/sidecar.py │ ├─d07701a911f53d23ee3927df32dec08da92685172a89048549f18ee157f82a22 │ │ └─46677 /pause │ ├─711e077ee021cf8ba43c6dd8cacd2b296c24bc331165d0f6ff324e09637c2330 │ │ └─21947 /manager --metrics-bind-address=:9782 │ ├─edbb18e364951fd5f9c40cc17f98f475498458c81cb590f7e8e45aee5e883d02 │ │ └─17323 /pause │ ├─1ac0b523763b93a12999590ac7c3412cdddde732a2129ea1f3c31391b5069cd8 │ │ └─5902 /pause │ ├─5492910fe2414a9e1e4898d8aabbe6f8f6397e7050a699184189e67975c9d7fd │ │ └─41256 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─b719dcef1048f0745b291c7ef509cfaf7defe063ed9ce7f966cd7eef67cb542b │ │ └─22892 valkey-server *:26379 [sentinel] │ ├─46a64923d682eae317060980a158fc3aa23a3bc75f49d87b97b658d84cf90c62 │ │ └─5872 /pause │ ├─9c4eae7c71fd877d819f5f7cc2cba95b630c9665d48f5174bf3fc62b181404a0 │ │ └─23258 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─75aae80209679fb97c42a1e94e7210a646b611c560ba16de0a7e526f66ffa792 │ │ └─17603 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─0132ddc717aa3e7339bfce6034e11317b616baebedeee850d4532c02fb7066cb │ │ └─17642 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─e9111d6882fdd8606bcca3e1b7dacbafa938e973fa0b8b7177471ac2bc8463ae │ │ └─4754 /pause │ ├─0db60e4310a57e5f8e24a3f31e4dfa9515c9a57d25c7714d251a9bf64c6055c7 │ │ └─17948 /pause │ ├─c6fd62092fe59ac2cdc1b1514ff992daae1a1a16d18cbe1fc6999949f64e68b1 │ │ └─40149 /pause │ ├─a43ad03b5b1f818541aa8858161e0b15a51a2753e9d7b6ec2df312bcd3798830 │ │ └─42280 /bin/oauth2-proxy │ ├─2deaf8075e4be687f952c36617f75aaed6c9de4e112b1c6a6210db5ffaa439f3 │ │ └─22740 valkey-server *:6379 │ ├─312110fbdd63ce2ecc3593810fc2c8f94e081797afd1467338dea52af94cb8fe │ │ └─40788 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─1b354440eeb8c937f76d2d4408e65544ee762d6dddb59e183086aec428a0bb7b │ │ └─46485 /pause │ ├─fbeb7e94fde6cedac2fb2fe636e14a50881e0d3089d459a180bb686ce42a5334 │ │ └─8080 /coredns -conf /etc/coredns/Corefile │ ├─e272355a8a935de6a0c27a9250f76bc3375a404db409bd8b61808ee20291a07a │ │ └─4843 kube-apiserver --advertise-address=199.19.213.29 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─e5dc967812fddda50007a32f0124f7900b74dcdaba6e33373c01cc6ded844096 │ │ └─40417 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─7799f61cf2592b9311743a5f0153efcbfdd3759228c2e814bdaf9a702fc1f660 │ │ └─32533 /pause │ ├─39e0f56b479e735971972a0d173e61510738d53207738ed2ffca5665bf062fe6 │ │ └─40250 /pause │ ├─a86e36d6ba031be6ee45a105ef5792cfb296cdf7db45e453e3a74082cf887d09 │ │ └─4697 /pause │ ├─c117bb9b13b6c3a48987248177414ee579ac6423f17597f09cd7a3f64a78d54b │ │ └─7975 /pause │ ├─299d113e9b218f29529dafa5642fe908a6872a9ddd74c1700ef42b695cdb9e54 │ │ └─42360 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─426cfd9700dabc56dc860702f451c75d035e5ebd0919c3510f01d7ef46240dde │ │ └─25828 /pause │ ├─eed373caeef2e9593892cb00a7fcfcccb70970289c2b796f10aab457646b97c6 │ │ ├─22939 mysqld --wsrep_start_position=51b750ff-3f89-11f1-b24a-07ca49eb8164:20 │ │ └─23088 /var/lib/mysql/mysql-state-monitor │ ├─7ad5655cea5ff68b2c7e1e50c7e48fcc4614f044e0bc5f1904358d8f210a82d5 │ │ └─31606 /pause │ ├─2bf6d298ef994f83d508c663f67011ebb7c75507256cbf897c37daf5b9818bd4 │ │ └─23036 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─a74698c30ab15fca5681805a413a7a901062e56853b7a3396eb2340f8724bfd1 │ │ └─7629 /pause │ ├─febceaf17e465234ccecc0dff66225a091ccbd780e31a4bb2e6735e9555cbf50 │ │ └─17681 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─9043a290cae87ba28f84f5f5d63b74cec1decbb4a644b421f79284f47a8a2a09 │ │ ├─48714 apache2 -DFOREGROUND │ │ ├─50298 (wsgi:h -DFOREGROUND │ │ ├─50299 (wsgi:h -DFOREGROUND │ │ ├─50300 (wsgi:h -DFOREGROUND │ │ ├─50301 (wsgi:h -DFOREGROUND │ │ ├─50302 (wsgi:h -DFOREGROUND │ │ ├─50303 apache2 -DFOREGROUND │ │ └─50304 apache2 -DFOREGROUND │ ├─e6ac52fbb275ef75613bff4db6d99fd0e57e83ef5f5e87d2376f66e2edbfdcd9 │ │ └─18114 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─9446a324da68c300b3fb7b040ce65cb733009af48ad3ada38a1d13fc5fad626f │ │ └─7662 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─160e442512cde976b05996cc878d25ecc96779a0e0b38c4edea1ff179eb8c749 │ │ └─8012 /coredns -conf /etc/coredns/Corefile │ ├─f27571ac0533fa042acbdc38fc6c82c692b9fae99534ffd7e9408eeb39cb392a │ │ └─22678 /pause │ ├─3705ca0fa3193d9544f1a49325bf0a10bdd2b9cf67b1581a87f67d30fb1fbaec │ │ └─6644 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─10761924c19b2b2713a3522ce1f93c5922bd0192a55d1d5914160379006712c6 │ │ └─46531 /pause │ ├─5af2ba021abee8748aec4b3d44a81626fcfec264528523bf6333837d415231a2 │ │ ├─18313 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─18337 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─18590 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─48218 nginx: worker process │ │ ├─48219 nginx: worker process │ │ └─48220 nginx: cache manager process │ ├─894649bc2e5618a72cb59c0f32363382669e513b6bbd0631894a9e41053fcb7e │ │ └─4889 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─413f0aca4ee7d49fd1a9f5f90c7768b3f396a0e3b51d88a5c44128d0c0c5ab1b │ │ ├─48419 apache2 -DFOREGROUND │ │ ├─50141 (wsgi:h -DFOREGROUND │ │ ├─50142 (wsgi:h -DFOREGROUND │ │ ├─50143 (wsgi:h -DFOREGROUND │ │ ├─50144 (wsgi:h -DFOREGROUND │ │ ├─50146 (wsgi:h -DFOREGROUND │ │ ├─50147 apache2 -DFOREGROUND │ │ └─50148 apache2 -DFOREGROUND │ ├─a42c6b560448718b8c2e3750506a949334f98b4ab3a513ea534cf321aa9512a8 │ │ └─22605 /pause │ ├─a092868fb9971b9a255f1ac6149a88d0d739c1d8917641cce1620a1ee6743832 │ │ └─17993 /pause │ ├─6eb4cea0917f7d0a3b2a25b3bc19b62046cf9295c3b3fbfe84d00052ebae066a │ │ └─40065 /pause │ ├─abe00cf3e6a91d2eae775403bc5d679a776aa83207c20b08abb2f761e014349f │ │ └─21046 /pause │ ├─82670df8509fd98b23f5d615de43dcaeadc416018cc458b3fcfab8f960655385 │ │ └─18405 /server │ ├─7edd002e4a6a74abb2f7ef9e2e10bef3ae47a040434987c8a3f323aab6b8acb5 │ │ └─42180 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─fd3edb280d0d18acfb63de5fd008863cf4dc19a862faa06cb1bae3f18b24fc0f │ │ └─21170 /pause │ └─77af86a869d215e9f1d1fd6bbcf4ee840e8b661c2a5de11656d97691158ea029 │ └─31717 /secretgen-controller ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount