Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─703 /lib/systemd/systemd --user │ │ └─704 (sd-pam) │ ├─session-4.scope │ │ ├─1457 sshd: zuul [priv] │ │ └─1470 sshd: zuul@notty │ └─session-1.scope │ ├─ 700 sshd: zuul [priv] │ ├─ 717 sshd: zuul@notty │ ├─ 866 /usr/bin/python3 │ ├─ 1461 ssh: /home/zuul/.ansible/cp/199.19.213.216-22-zuul [mux] │ ├─41148 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-tgjxpmgywwqwbxquybdoiajqjiiamenb ; /usr/bin/python3'"'"' && sleep 0' │ ├─41149 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-tgjxpmgywwqwbxquybdoiajqjiiamenb ; /usr/bin/python3' && sleep 0 │ ├─41150 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-tgjxpmgywwqwbxquybdoiajqjiiamenb ; /usr/bin/python3 │ ├─41151 /bin/sh -c echo BECOME-SUCCESS-tgjxpmgywwqwbxquybdoiajqjiiamenb ; /usr/bin/python3 │ ├─41152 /usr/bin/python3 │ ├─41153 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─41155 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 40 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 3019 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4645 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 378de91fda88a990b517cdda57bbebd6eb61448268a41c79890878adc9fff10d -address /run/containerd/containerd.sock │ │ ├─ 4689 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3514e23e388ed3487502d68d5d774933bd05618a32a1e1ba2929d86a8a9196c5 -address /run/containerd/containerd.sock │ │ ├─ 4697 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1f94678592a2b3d7b80a17da9aaf262981623ceb2e475b97f393e5c529b59605 -address /run/containerd/containerd.sock │ │ ├─ 4700 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4d6fa15b98838b955bf8521fbc2a43ff972cde202cf5d6e8de1b2cecb0041246 -address /run/containerd/containerd.sock │ │ ├─ 4725 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e2d9c9bd6ad54fab60a9358c2242fe4aee56ea68965b37e70aabc5c0f2cfac5d -address /run/containerd/containerd.sock │ │ ├─ 5213 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f3ad4367f84e556fdc3ce7a70d93588732fb782ce05613e5810e863d5138d1fe -address /run/containerd/containerd.sock │ │ ├─ 5977 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5aa00464c16db072882e3a958b1acf769ebd5ceacd4fad279b12feb62f33ecd7 -address /run/containerd/containerd.sock │ │ ├─ 5990 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6148a8a6823ad1aaf5adeb542027779d118969a021c3d1790f47c96fd996ca87 -address /run/containerd/containerd.sock │ │ ├─ 7431 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1f7db2cb690f189d5e703d3be4a0da4f7541029175470ace241652a40087dfe3 -address /run/containerd/containerd.sock │ │ ├─ 7849 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c929e8e7772dcd8406955f5d6667117b73947165b309af25c7c6daf3d1ee17a1 -address /run/containerd/containerd.sock │ │ ├─ 7890 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 297406c24719f5c21bf0914289f2274292c89e2cc5dc778116ed3a3ebf7fdaba -address /run/containerd/containerd.sock │ │ ├─ 8305 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8c1acaf911372f84d0f2313bca0a66a0487de07e189430356578d481ace90b89 -address /run/containerd/containerd.sock │ │ ├─ 8826 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c7a4d96d4a810729f733caee9f8b856a53e5fdfed63e472a3a694d46e3ff929d -address /run/containerd/containerd.sock │ │ ├─ 8864 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 88ee978f1724754e85df5d44752792316001ed756a7df58079053d8d9c575632 -address /run/containerd/containerd.sock │ │ ├─ 8904 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e3b9ce65b34a1a96b255e7881e9525800c669d56f9361bf57ee1028114e04c47 -address /run/containerd/containerd.sock │ │ ├─11325 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d635c6534369a035a25198fdf05bfc7652ba5c42abf24e358120593e4dfccbf8 -address /run/containerd/containerd.sock │ │ ├─11423 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7184aefeb76cf555f4bfc06c1d3cd7f991150c0d532143cae20708db3f36d5d5 -address /run/containerd/containerd.sock │ │ ├─12139 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 78162bca98e36a8c5742cc84c35aacb077013f5348c9c8068250ea228eeb9042 -address /run/containerd/containerd.sock │ │ ├─12233 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 55ab90ad8de07acef11b316117e0acc99739ebbb19451f1b883560a1e083ccba -address /run/containerd/containerd.sock │ │ ├─12594 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 658fe9e2f9ea4fb74b6227f904e7cabb6af46cdafde9c009e289fb95eb711131 -address /run/containerd/containerd.sock │ │ ├─12945 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d54b182920b8a358f4a22d57fef077d12a7c350855b2dfa35e9498e4da9db6f5 -address /run/containerd/containerd.sock │ │ ├─13239 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ece4c2f5e8a91a64219f5bcc0f12dc3b1ab6185983d65ac5375db34980f43f1f -address /run/containerd/containerd.sock │ │ ├─15257 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 015a79fb30bb26436774474bcd365271e31b4a25e5655f13511de07549682cda -address /run/containerd/containerd.sock │ │ ├─15909 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aa57a832ef95f83812a8743a11a1beec731df54aeeb6e37bec5205ac9e53f185 -address /run/containerd/containerd.sock │ │ ├─19532 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 403f8f85ee65a60d7f16c9a89b4b55781420ce820ce6f66a5f12e71141e56fd6 -address /run/containerd/containerd.sock │ │ ├─22220 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0b182cc0ed51a50ad86718898922ff9968c520bdd7ebc5fb6cb7d4afe65f8303 -address /run/containerd/containerd.sock │ │ ├─22355 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ecd742b85fe848f9d8e8247e9fcf9e73124a6ed62c27dcdcdfba34e496302a58 -address /run/containerd/containerd.sock │ │ ├─22394 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9eac2300eaaeabf42d75dcef98a3e1904d2753350f842e318f9a17ab8b6e691b -address /run/containerd/containerd.sock │ │ ├─22440 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f05173c23722210b5cc3344b731e8e1eca5a8c396bc6f8485bb3d70a8c714cb8 -address /run/containerd/containerd.sock │ │ ├─23569 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 473cc9e8bb6e9193799dd9a3fc1ec944d45a7f4283efc4610dfa71a9d8447904 -address /run/containerd/containerd.sock │ │ ├─23642 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 305aa4a1b15655d4b23a337cb7eb7e2993e355a3e3b6a2813cfd0cb7b89222a1 -address /run/containerd/containerd.sock │ │ ├─24643 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 66750267d0e5afb3205fc7fbd12f71c620788f18d17454d4f50dfce6985c1818 -address /run/containerd/containerd.sock │ │ ├─26125 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b085f0b2b5a85ee0aed9a176fd4fabf90ca54658b2f8ea201106826d5453ce09 -address /run/containerd/containerd.sock │ │ ├─31767 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b5ff5aecfdc27f6b25beee715d0c5a3f292bcccb1fcc3f0304219769929275bf -address /run/containerd/containerd.sock │ │ ├─31827 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6a4a84e4a437c631250b70f6130e6f5f35442789598577364c3b4417c4c86923 -address /run/containerd/containerd.sock │ │ └─31878 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1b3ee21f7359cd4b7ccf89ad0316ae0dc8c8e43c3fa1eb94dcdd292bd98c348b -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1188 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─524 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─391 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─631 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─644 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─618 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─5116 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.216 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─358 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─650 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1392 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─395 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─615 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─397 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─630 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─621 /lib/systemd/systemd-logind ├─k8s.io │ ├─55ab90ad8de07acef11b316117e0acc99739ebbb19451f1b883560a1e083ccba │ │ └─12257 /pause │ ├─9370f835efa87b9efc50a08445ecd9f092aa6eaf030d75205aa77fc55190bd68 │ │ ├─33247 apache2 -DFOREGROUND │ │ ├─35550 (wsgi:h -DFOREGROUND │ │ ├─35551 (wsgi:h -DFOREGROUND │ │ ├─35552 (wsgi:h -DFOREGROUND │ │ ├─35553 (wsgi:h -DFOREGROUND │ │ ├─35554 (wsgi:h -DFOREGROUND │ │ ├─35555 apache2 -DFOREGROUND │ │ └─35556 apache2 -DFOREGROUND │ ├─8c1acaf911372f84d0f2313bca0a66a0487de07e189430356578d481ace90b89 │ │ └─8331 /pause │ ├─b257f5bd03adc2b2b16ac1bb6057ceebb7a8a7e39aef99fb50029c973d661f0f │ │ └─6411 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─cca5af796e59ec56220630732b646000479ef20377d335c338d7cd282489927e │ │ └─23878 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─5aa00464c16db072882e3a958b1acf769ebd5ceacd4fad279b12feb62f33ecd7 │ │ └─6030 /pause │ ├─226d744c620a9c9b283c3cbcce9f302f6a53eefc171f4d63069ec56014c89100 │ │ ├─23191 python -u /app/sidecar.py │ │ ├─23414 python -u /app/sidecar.py │ │ └─23415 python -u /app/sidecar.py │ ├─d53015d97f26bb6af96a7f441e09845ede24aee663ae781493f26e1bb0db1aad │ │ └─15715 /bin/memcached_exporter │ ├─9d5a049e8c126cd7263c85c58914bed53c7f5c239d6b0d91495d87d22608dafd │ │ ├─13587 mysqld --wsrep_start_position=0a6cf896-2de8-11f1-9321-a3d75b123db0:20 │ │ └─13736 /var/lib/mysql/mysql-state-monitor │ ├─87de4c1097b50c35fd6025a94ef1f7f7c140b7622fcc1b3cbf97bd0255f60c98 │ │ └─9093 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─5b8b6dfd254fe21a57816503d198ee19384db94af1c6e190df0606286d98e94a │ │ └─4914 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─78162bca98e36a8c5742cc84c35aacb077013f5348c9c8068250ea228eeb9042 │ │ └─12163 /pause │ ├─403f8f85ee65a60d7f16c9a89b4b55781420ce820ce6f66a5f12e71141e56fd6 │ │ └─19555 /pause │ ├─ecd742b85fe848f9d8e8247e9fcf9e73124a6ed62c27dcdcdfba34e496302a58 │ │ └─22379 /pause │ ├─02f747862815434d9dbcc2da217b353ef93c9b568e758018c061bc14d7dc6ed8 │ │ └─16048 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─6dc50c9e1bc6753606c273708917d543acae555f76e4f12972124b8a2a3c2530 │ │ └─4932 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─015a79fb30bb26436774474bcd365271e31b4a25e5655f13511de07549682cda │ │ └─15280 /pause │ ├─7184aefeb76cf555f4bfc06c1d3cd7f991150c0d532143cae20708db3f36d5d5 │ │ └─11447 /pause │ ├─2dc9f7476862ea402b7d014352ecb9fc514c73240d5039d2f68f4b28367fbd51 │ │ └─24366 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-216.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─034a7efad8da2c50039956ac0d53ad22505c1270af62d8beb5206ad13014aede │ │ ├─28503 apache2 -DFOREGROUND │ │ ├─28522 (wsgi:k -DFOREGROUND │ │ ├─28523 (wsgi:k -DFOREGROUND │ │ ├─28524 (wsgi:k -DFOREGROUND │ │ ├─28525 (wsgi:k -DFOREGROUND │ │ ├─28526 apache2 -DFOREGROUND │ │ ├─28527 apache2 -DFOREGROUND │ │ ├─28530 apache2 -DFOREGROUND │ │ ├─28533 apache2 -DFOREGROUND │ │ ├─28536 apache2 -DFOREGROUND │ │ ├─28537 apache2 -DFOREGROUND │ │ ├─28538 apache2 -DFOREGROUND │ │ ├─28539 apache2 -DFOREGROUND │ │ ├─28540 apache2 -DFOREGROUND │ │ └─28541 apache2 -DFOREGROUND │ ├─d635c6534369a035a25198fdf05bfc7652ba5c42abf24e358120593e4dfccbf8 │ │ └─11351 /pause │ ├─e2d9c9bd6ad54fab60a9358c2242fe4aee56ea68965b37e70aabc5c0f2cfac5d │ │ └─4809 /pause │ ├─f05173c23722210b5cc3344b731e8e1eca5a8c396bc6f8485bb3d70a8c714cb8 │ │ └─22464 /pause │ ├─c929e8e7772dcd8406955f5d6667117b73947165b309af25c7c6daf3d1ee17a1 │ │ └─7874 /pause │ ├─84cb599ef6e4471044207ed59deaa514bb8b32a89bd33de6d1b89594551fc1d5 │ │ └─12425 /manager --metrics-bind-address=:8080 │ ├─afa14b7ed883748f4d81ceb9f62f80acaf6a2cebfb6cd82d63e9905d8f2455d4 │ │ └─12743 percona-xtradb-cluster-operator │ ├─13257ea60c23744a03bc7182871523fc3f0ece607ed38d58adcff161bf7f996e │ │ └─13803 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─66750267d0e5afb3205fc7fbd12f71c620788f18d17454d4f50dfce6985c1818 │ │ └─24666 /pause │ ├─b86ce88e3085ea2fb40eac995fdefc1656dea338b4ac48c21ef3e589e478d19c │ │ └─22934 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─1f7db2cb690f189d5e703d3be4a0da4f7541029175470ace241652a40087dfe3 │ │ └─7455 /pause │ ├─bb3cb07feac04396dae05e005fb4c28b1f05e27759fedb61a19f0c8085b27fb5 │ │ ├─23218 python -u /app/sidecar.py │ │ ├─23417 python -u /app/sidecar.py │ │ └─23418 python -u /app/sidecar.py │ ├─9eac2300eaaeabf42d75dcef98a3e1904d2753350f842e318f9a17ab8b6e691b │ │ └─22425 /pause │ ├─aa57a832ef95f83812a8743a11a1beec731df54aeeb6e37bec5205ac9e53f185 │ │ └─15932 /pause │ ├─40ba31572a3b65ef309c82f4daf6091cc47edebdaf2d03e9fc950db1021699ba │ │ └─5058 /kube-vip manager │ ├─a52cc9bb7dab50861a9959309c238a34065733b90f573bf876fc725439f167ff │ │ └─13684 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─378de91fda88a990b517cdda57bbebd6eb61448268a41c79890878adc9fff10d │ │ └─4708 /pause │ ├─143a15b4063171da3c5ca5ca4bf7a036aac146bfe8fa33a0f60ee908c6cd5836 │ │ ├─11660 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─11673 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─11814 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─33002 nginx: worker process │ │ ├─33003 nginx: worker process │ │ └─33004 nginx: cache manager process │ ├─7ec3185392b1dee4adb629951bb872860e655eb5ea771b92705113764cac8770 │ │ └─22721 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─79a019e86b2a6f711da87be23b636eeaa0effb9833f4d86eb4aeb6d86e879d01 │ │ └─4883 etcd --advertise-client-urls=https://199.19.213.216:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.216:2380 --initial-cluster=instance=https://199.19.213.216:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.216:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.216:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─88ee978f1724754e85df5d44752792316001ed756a7df58079053d8d9c575632 │ │ └─8889 /pause │ ├─d54b182920b8a358f4a22d57fef077d12a7c350855b2dfa35e9498e4da9db6f5 │ │ └─12967 /pause │ ├─f3ad4367f84e556fdc3ce7a70d93588732fb782ce05613e5810e863d5138d1fe │ │ └─5236 /pause │ ├─f4f31065ee9c5279804613e3edba10bfa9a79dab93660b0e092d57cc013e9e3b │ │ └─7981 /coredns -conf /etc/coredns/Corefile │ ├─9a1c215420e7c53b7418c4774cf4ad5b5e27027cb9ca46b971bf8b8aee032c3f │ │ └─24508 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-216.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─658fe9e2f9ea4fb74b6227f904e7cabb6af46cdafde9c009e289fb95eb711131 │ │ └─12618 /pause │ ├─da44dbf0a5374c7ca22414b6dc3318bea40b02d17020bffea374238df58ba222 │ │ └─9047 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─305aa4a1b15655d4b23a337cb7eb7e2993e355a3e3b6a2813cfd0cb7b89222a1 │ │ └─23665 /pause │ ├─4d6fa15b98838b955bf8521fbc2a43ff972cde202cf5d6e8de1b2cecb0041246 │ │ └─4789 /pause │ ├─5831018471f342d865a5a7ffb707ea030dae06f94f75f6855be5a49f9d714b7e │ │ └─11709 /server │ ├─b085f0b2b5a85ee0aed9a176fd4fabf90ca54658b2f8ea201106826d5453ce09 │ │ └─26171 /pause │ ├─0f8b371e59ef43185ed9c27945d50a1c2d61bf1c645ff2ffc717a2bffb03198b │ │ ├─33273 apache2 -DFOREGROUND │ │ ├─35540 (wsgi:h -DFOREGROUND │ │ ├─35541 (wsgi:h -DFOREGROUND │ │ ├─35542 (wsgi:h -DFOREGROUND │ │ ├─35543 (wsgi:h -DFOREGROUND │ │ ├─35544 (wsgi:h -DFOREGROUND │ │ ├─35545 apache2 -DFOREGROUND │ │ └─35546 apache2 -DFOREGROUND │ ├─6c2eab6a21adb55752f064ad2c196adb26b371fed1e5789a4e3637a390b8cb8a │ │ └─24408 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─1b3ee21f7359cd4b7ccf89ad0316ae0dc8c8e43c3fa1eb94dcdd292bd98c348b │ │ └─31913 /pause │ ├─297406c24719f5c21bf0914289f2274292c89e2cc5dc778116ed3a3ebf7fdaba │ │ └─7919 /pause │ ├─69c2aba4dec77d032aa32632b03b47c6f8e319d8b9fd8356ecb23ec5e94236fe │ │ ├─6623 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6982 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─30e5a8614ca65e4b0b9945b4409e9c5b66b7cb53adfaa5b51d73eda6f413a3d8 │ │ └─7497 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─6148a8a6823ad1aaf5adeb542027779d118969a021c3d1790f47c96fd996ca87 │ │ └─6038 /pause │ ├─f10df9f2670338d6625ccfec177d79fa98ad32bfc978ad373994444a7504f955 │ │ └─5263 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─4c6fadb975bf181cb158576cf373287665b42ecbcfafecb8b463036f5a14c40b │ │ └─12308 /manager --metrics-bind-address=:9782 │ ├─e6d1a848200d1c849a65abe3131ddb1466b6e36b3f43730bc59d2282a68edf6e │ │ └─8468 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─4726bf586ec0cc27856fc57754ecaef222d0c34a89d9b219db5440b7fba7246a │ │ └─24711 /bin/oauth2-proxy │ ├─0b182cc0ed51a50ad86718898922ff9968c520bdd7ebc5fb6cb7d4afe65f8303 │ │ └─22252 /pause │ ├─1f94678592a2b3d7b80a17da9aaf262981623ceb2e475b97f393e5c529b59605 │ │ └─4818 /pause │ ├─c4687ec236fe63e8cc87f546f771c7cd28d0559a9abc06f86e148c1977850018 │ │ └─19697 /secretgen-controller │ ├─67b147cccd004321a2cf9fbedc17345006837f81d2c66590802933c4244e9a1d │ │ ├─13398 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─14752 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─3514e23e388ed3487502d68d5d774933bd05618a32a1e1ba2929d86a8a9196c5 │ │ └─4810 /pause │ ├─c7a4d96d4a810729f733caee9f8b856a53e5fdfed63e472a3a694d46e3ff929d │ │ └─8854 /pause │ ├─efcdf2b35f8de8c3810683f16ca9cf1642ded80149344550c8f45c599f953c1e │ │ ├─33260 apache2 -DFOREGROUND │ │ ├─35580 (wsgi:h -DFOREGROUND │ │ ├─35582 (wsgi:h -DFOREGROUND │ │ ├─35583 (wsgi:h -DFOREGROUND │ │ ├─35585 (wsgi:h -DFOREGROUND │ │ ├─35586 (wsgi:h -DFOREGROUND │ │ ├─35587 apache2 -DFOREGROUND │ │ └─35590 apache2 -DFOREGROUND │ ├─4078fb845cd5f4c58444da07a8d63ac00d43c76da92d9e71d91a2ca2620da1fb │ │ └─23432 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─82e3b916d2f357f6eb7bd472464c72804e72681824ad1108a87a183ab3bfd5d9 │ │ └─24454 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─1cd626fd57a961ccee086e03e0c71d038dd433666261f8443dc66b6c12fa2de9 │ │ └─24692 /bin/oauth2-proxy │ ├─6a4a84e4a437c631250b70f6130e6f5f35442789598577364c3b4417c4c86923 │ │ └─31858 /pause │ ├─c89bf6dfcbf16aa30207f67c065a3b5fd7a7166d03df8d828bd2750969c8fea4 │ │ └─7950 /coredns -conf /etc/coredns/Corefile │ ├─ece4c2f5e8a91a64219f5bcc0f12dc3b1ab6185983d65ac5375db34980f43f1f │ │ └─13262 /pause │ ├─e3b9ce65b34a1a96b255e7881e9525800c669d56f9361bf57ee1028114e04c47 │ │ └─8928 /pause │ ├─15ef018f98fdbbc1009f8934fff171a68809f4c4694295af4134f95536f6161c │ │ └─24582 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─b5ff5aecfdc27f6b25beee715d0c5a3f292bcccb1fcc3f0304219769929275bf │ │ └─31793 /pause │ ├─d8a36e1461655375f8c39e79f8775c083aeedc949b0c8179bcf3319db10c3cac │ │ └─15651 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─473cc9e8bb6e9193799dd9a3fc1ec944d45a7f4283efc4610dfa71a9d8447904 │ │ └─23605 /pause │ ├─d6233fbc8ed8af03ae3783b8e63c9460160e055de00d2ffdc882587b255c6895 │ │ └─9138 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─7417b2342575d02580b5859bcc798e55b0fd2f1e40f3f70c03c18baea588da69 │ │ ├─24979 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─24998 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─25006 erl_child_setup 1048576 │ │ ├─25054 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─25055 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─25065 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─25178 /bin/sh -s rabbit_disk_monitor │ ├─573859f356f97d2c78e8d2845925f8521d6542978253c0df101f1c217a313fe9 │ │ └─24805 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ └─89f820f1ed7fe9ee551aa6018b7f63a1c81e2d3f048da40f935fa7829ce88ae8 │ └─4946 kube-apiserver --advertise-address=199.19.213.216 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount