Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-4.scope │ │ ├─1353 sshd: zuul [priv] │ │ └─1366 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 633 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1357 ssh: /home/zuul/.ansible/cp/199.19.213.100-22-zuul [mux] │ ├─38944 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-vimpyhusmgfcfibwynyueqfcshtdkaeg ; /usr/bin/python3'"'"' && sleep 0' │ ├─38945 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-vimpyhusmgfcfibwynyueqfcshtdkaeg ; /usr/bin/python3' && sleep 0 │ ├─38946 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-vimpyhusmgfcfibwynyueqfcshtdkaeg ; /usr/bin/python3 │ ├─38947 /bin/sh -c echo BECOME-SUCCESS-vimpyhusmgfcfibwynyueqfcshtdkaeg ; /usr/bin/python3 │ ├─38948 /usr/bin/python3 │ ├─38960 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38962 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2877 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4454 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a13e55a2320f40072a0be30421bc8b989c766d66169e02826fa3ece70aa61461 -address /run/containerd/containerd.sock │ │ ├─ 4460 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 79cd5efa6ea1a823fd9a12f6fa8c3b77bc985b783020fd2de2d96f52b237f5fc -address /run/containerd/containerd.sock │ │ ├─ 4595 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e72586d1b942508bb4b5f38f40304df1a95b9ff7252b3aaabf45d2d2627aae80 -address /run/containerd/containerd.sock │ │ ├─ 4618 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aa867da216e1993f7984117e519f20acaf0e0e3f61bf12e91004e689d87cb21c -address /run/containerd/containerd.sock │ │ ├─ 4644 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5164aee38d939481e71aaf79eff942480b081b5bb8b64d1d3d41d33c3ff89482 -address /run/containerd/containerd.sock │ │ ├─ 5011 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6ba83eeb293b58d694cf14e31c0c825749892471e396f602308bbbd5f35b7afa -address /run/containerd/containerd.sock │ │ ├─ 5660 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c57cbddb3193f5dc4f75cef51eea0adfa8a0eb50153545dcf2b83b4a4f02cee7 -address /run/containerd/containerd.sock │ │ ├─ 5692 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bfa47445a5cf25999e915e9dd5565de3a67d81e2c39e2811b076d179b619201c -address /run/containerd/containerd.sock │ │ ├─ 6851 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6f48e27e3e113521c17f592de030d774569ee1d88c963b6b0b0e1efeccabc8e7 -address /run/containerd/containerd.sock │ │ ├─ 7278 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 012f5236f036e176670ac286a2775478ef7c1a2ae81493eebe7d70553b584e9b -address /run/containerd/containerd.sock │ │ ├─ 7328 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d2cbac6c83fa7a6ef5ab6062fbe43de8a7a32f7ead1dd5a4ad5ce3700f17cd43 -address /run/containerd/containerd.sock │ │ ├─ 7595 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0b350ae490b60b26df2b89b33ab3339f4290aef112769fb0df1b52f395d120d2 -address /run/containerd/containerd.sock │ │ ├─ 8059 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 465d2e95fa42a9fc2de51f870e5079adf47222639d8e0c3d1ed50d1a3b8b53f7 -address /run/containerd/containerd.sock │ │ ├─ 8130 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8b213f0eae9c04236bc6746b03ebb7716f27d1f73d1299432e5d64454432932b -address /run/containerd/containerd.sock │ │ ├─ 8174 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 43a6357702c6a26d73037f183d3c075c2bedbb2e0809ce38d491a4aa65d0bd41 -address /run/containerd/containerd.sock │ │ ├─10416 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3d6fdf258b5c7e8e674133a288111d5599ee63c28e9ab40d57f842ea6c3ea3f8 -address /run/containerd/containerd.sock │ │ ├─10503 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ea4139aa8422bfc2d3d7d92e1a8c15b7f8cf1006b704ab9247647d33e2e68b91 -address /run/containerd/containerd.sock │ │ ├─11137 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9f8f87c20e7ccf94262a0e214717a41d18df1f1049ea3379e36b253a92e57a9e -address /run/containerd/containerd.sock │ │ ├─11230 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fcfc492ef7e6ddbc1a8ec5688b098cf3234ce99f42f510a5aef3b77397aa24cb -address /run/containerd/containerd.sock │ │ ├─11502 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 75eb8b450d2a1ac457b0586644086f0a8fb567dc543ded3222328cd15f5711fc -address /run/containerd/containerd.sock │ │ ├─11840 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9ef5c8c5ce568bd6991f3ccc900bc18f152b93936180660e2d5d5e0815b6d356 -address /run/containerd/containerd.sock │ │ ├─12155 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ef68307db34dc229e95b212ed2c36802d8a9256362373c3c30819f0cddfab0a9 -address /run/containerd/containerd.sock │ │ ├─14100 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 56578a826fae266be7adc6da1455191ea0920eecb8cd9b3112d2f64e24fc110c -address /run/containerd/containerd.sock │ │ ├─14746 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 16d6e33e72ec4f6a4d97c2ca7aa812fc99e0a65af8208e52cb6b8a4e69d94cbc -address /run/containerd/containerd.sock │ │ ├─18386 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 91c596bdbc44d34e01baee436f8ab8f1fd9f35f5d6924c0f7639a2be97a91488 -address /run/containerd/containerd.sock │ │ ├─21138 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6ce794ba4b9023ee61aff9b853a384535bfc4360fd8b4e5e6ee285a3483b15e5 -address /run/containerd/containerd.sock │ │ ├─21276 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f00dc714ca82cb3d512dd0226981f5b30ab079f137c0c888fbe390e1cf41644e -address /run/containerd/containerd.sock │ │ ├─21321 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b6ed8b7d7914726704f8346b23048fff471508ea3c0a014abcf08d5d5c73f281 -address /run/containerd/containerd.sock │ │ ├─21358 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dfb871364b64e07854b9c5badd45a81779e869fdb2c9b09fb77c43014f2af3d8 -address /run/containerd/containerd.sock │ │ ├─22533 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0a0b03b70dde5be2cba458602a49bf76f65738b915dff511c087617924078f82 -address /run/containerd/containerd.sock │ │ ├─22648 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f6a6f890f97e160beca6eaad5c8c500a4c48d760b0bbb313895e7cccf0b63a46 -address /run/containerd/containerd.sock │ │ ├─23420 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b1d8f210c658235e83dc466220dcc495884b85fe4136be78413478f4c931e786 -address /run/containerd/containerd.sock │ │ ├─25139 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aba92940973e18c4f8a690b18660f1230b786dabdd1dafa84a77679e1e07319b -address /run/containerd/containerd.sock │ │ ├─30629 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ba8b7bfe47ed66b86f76f6a46904c35339565d24b9be143133af1158671323d6 -address /run/containerd/containerd.sock │ │ ├─30673 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9f1ef1d04937621288dca73168079b4a62a6ffc157c36f69e1eda544420edabb -address /run/containerd/containerd.sock │ │ └─30718 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2c77bcaa51d59944a639caa8b5b857cab9edb51c209fcad5b9241a5d2c29a4d3 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1094 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─542 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─561 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─532 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4880 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.100 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─566 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1288 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─538 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─c57cbddb3193f5dc4f75cef51eea0adfa8a0eb50153545dcf2b83b4a4f02cee7 │ │ └─5707 /pause │ ├─9d79513c43d0ed49997573b446c3e01e902790fc6fe8d1ea1da9ffb53547cfaa │ │ └─22067 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─f6a6f890f97e160beca6eaad5c8c500a4c48d760b0bbb313895e7cccf0b63a46 │ │ └─22671 /pause │ ├─aba92940973e18c4f8a690b18660f1230b786dabdd1dafa84a77679e1e07319b │ │ └─25163 /pause │ ├─ba8b7bfe47ed66b86f76f6a46904c35339565d24b9be143133af1158671323d6 │ │ └─30656 /pause │ ├─ea4139aa8422bfc2d3d7d92e1a8c15b7f8cf1006b704ab9247647d33e2e68b91 │ │ └─10529 /pause │ ├─9f8f87c20e7ccf94262a0e214717a41d18df1f1049ea3379e36b253a92e57a9e │ │ └─11162 /pause │ ├─5164aee38d939481e71aaf79eff942480b081b5bb8b64d1d3d41d33c3ff89482 │ │ └─4707 /pause │ ├─ef5a4e0d11b0146dc039452ebe73cd30e129eae316a73a48e3f6692071638821 │ │ └─6912 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─b1d8f210c658235e83dc466220dcc495884b85fe4136be78413478f4c931e786 │ │ └─23444 /pause │ ├─e762de1f2351829b18cddfbb3bdb358768075ba6cdc00e8014616d8daaac93dd │ │ └─23736 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─cf786ab895b1755157b7fa68a626897bd4f70a850d841709569e20c4c4ef82b8 │ │ ├─22368 python -u /app/sidecar.py │ │ ├─22520 python -u /app/sidecar.py │ │ └─22522 python -u /app/sidecar.py │ ├─b6ed8b7d7914726704f8346b23048fff471508ea3c0a014abcf08d5d5c73f281 │ │ └─21344 /pause │ ├─aa76f872334a7ba3695f6131f4b779984d854d2d1aaa8f0681f0158d9e18c8f6 │ │ └─7670 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─d7c8d59d9696858314d40bd406db97d234b804f26f0b01ba12706246e1d2398e │ │ └─14474 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─27ace84efe7ad59f4a81892feb91038e7003d470714b948dce12f37a7e8f423d │ │ └─23126 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─91c596bdbc44d34e01baee436f8ab8f1fd9f35f5d6924c0f7639a2be97a91488 │ │ └─18410 /pause │ ├─1454a324483f911d09e63a033d56c3396242b6b4e1321a55396430e895c4e7e8 │ │ └─7396 /coredns -conf /etc/coredns/Corefile │ ├─ef68307db34dc229e95b212ed2c36802d8a9256362373c3c30819f0cddfab0a9 │ │ └─12180 /pause │ ├─79cd5efa6ea1a823fd9a12f6fa8c3b77bc985b783020fd2de2d96f52b237f5fc │ │ └─4509 /pause │ ├─97ce3b0a8726b7973217014b7d16da8e34219f343a1545d38f27c29440dc5865 │ │ └─8311 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─c2c232aafac3da28f33c86c8b6e796ec73d1dfff01cf2ad4230435b298146415 │ │ └─4770 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─fcfc492ef7e6ddbc1a8ec5688b098cf3234ce99f42f510a5aef3b77397aa24cb │ │ └─11254 /pause │ ├─15d1fddc21a111d3d89f9bd5aff8ebcd4e11f9147567c8be88701ad998c4f098 │ │ └─23673 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─f00dc714ca82cb3d512dd0226981f5b30ab079f137c0c888fbe390e1cf41644e │ │ └─21300 /pause │ ├─db09e5f9efee56ccccc75a7cedc38fe4302ea457c8c0564fb23d9aa862357a2e │ │ └─8350 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─591c415a95320bcf65a7dc5fdd0f7efcc118c2c1d97a70e83a90e891cfc33fc5 │ │ └─11668 percona-xtradb-cluster-operator │ ├─44e52270d54b0eae8ce49e49ae279c4df2b83911afedbe6d6d0b6fc4b877a19a │ │ ├─24177 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─24194 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-14.2.5.1/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─24219 erl_child_setup 1048576 │ │ ├─24269 sh -s disksup │ │ ├─24271 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/memsup │ │ ├─24273 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/cpu_sup │ │ ├─24303 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─24304 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─24314 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/epmd -daemon │ │ └─24405 /bin/sh -s rabbit_disk_monitor │ ├─f818e12ae12d38dd7c12a52d27c54a3598f8c73428f9e1fb203cd1f913847f2f │ │ ├─6128 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6501 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─bc592fe9e556bb9a61a60021bc952fbaee56d04b0be01734e6c512e59287e785 │ │ └─4756 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─ba7a65962ca930b51856c705a14597c6a373c5586908084c7cc079f966998871 │ │ └─18529 /secretgen-controller │ ├─aa867da216e1993f7984117e519f20acaf0e0e3f61bf12e91004e689d87cb21c │ │ └─4682 /pause │ ├─221e0f56f7190c8d52d81c87b2259d3d09d049c3ca03a47e45c97ce6917bf07e │ │ ├─32051 apache2 -DFOREGROUND │ │ ├─34456 (wsgi:h -DFOREGROUND │ │ ├─34457 (wsgi:h -DFOREGROUND │ │ ├─34458 (wsgi:h -DFOREGROUND │ │ ├─34459 (wsgi:h -DFOREGROUND │ │ ├─34460 (wsgi:h -DFOREGROUND │ │ ├─34461 apache2 -DFOREGROUND │ │ └─34462 apache2 -DFOREGROUND │ ├─bfa47445a5cf25999e915e9dd5565de3a67d81e2c39e2811b076d179b619201c │ │ └─5728 /pause │ ├─750c95d059b69b1fefac051247cc1c68ed75b23628ead8f7465f1471965a388a │ │ └─23639 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-100.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─0a0b03b70dde5be2cba458602a49bf76f65738b915dff511c087617924078f82 │ │ └─22564 /pause │ ├─9f1ef1d04937621288dca73168079b4a62a6ffc157c36f69e1eda544420edabb │ │ └─30703 /pause │ ├─dfb871364b64e07854b9c5badd45a81779e869fdb2c9b09fb77c43014f2af3d8 │ │ └─21382 /pause │ ├─e5116ab193d7c7bbb6c21b578df4fc4e1a5f59664d28af148f1296d031d84537 │ │ ├─12349 mysqld --wsrep_start_position=0de6d54d-4271-11f1-8149-8b3fc3a42206:20 │ │ └─12477 /var/lib/mysql/mysql-state-monitor │ ├─a1f9f9e29cabc5bbcb94854a6c70ddaf0ba7fa4e9cfbf86a04932834f6f5c190 │ │ └─21765 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─6ba83eeb293b58d694cf14e31c0c825749892471e396f602308bbbd5f35b7afa │ │ └─5036 /pause │ ├─9ef5c8c5ce568bd6991f3ccc900bc18f152b93936180660e2d5d5e0815b6d356 │ │ └─11864 /pause │ ├─aa76cbf1b3d0ed9ac23b8c2de78e36dac1d25ec93d68e41053fe23193a7ea0a2 │ │ └─5060 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─d1068d342c48fed17e239fc27269fe1efc62b6e0f5d53bc04c3bfb74b776159b │ │ └─24211 /bin/oauth2-proxy │ ├─e4aa5fced6158575d47af906ad755db79f4e7eca07fb86a280f913b67548f6c5 │ │ └─22612 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─16d6e33e72ec4f6a4d97c2ca7aa812fc99e0a65af8208e52cb6b8a4e69d94cbc │ │ └─14771 /pause │ ├─a60a43565dd9cf6ebe12ab5b8565d15ea3abf7da7daeb6956466b4e453d00618 │ │ ├─32028 apache2 -DFOREGROUND │ │ ├─34373 (wsgi:h -DFOREGROUND │ │ ├─34374 (wsgi:h -DFOREGROUND │ │ ├─34375 (wsgi:h -DFOREGROUND │ │ ├─34376 (wsgi:h -DFOREGROUND │ │ ├─34377 (wsgi:h -DFOREGROUND │ │ ├─34378 apache2 -DFOREGROUND │ │ └─34379 apache2 -DFOREGROUND │ ├─1414cad5e69b49e2cc15fc776b87aaffa5d01f9bbbd04cec2861554e7fe14a62 │ │ └─11307 /manager --metrics-bind-address=:9782 │ ├─81a6ad016247dd2265cb82ac54e298fb3cd8a5266506878a110719605acc8d13 │ │ └─5973 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─d2cbac6c83fa7a6ef5ab6062fbe43de8a7a32f7ead1dd5a4ad5ce3700f17cd43 │ │ └─7354 /pause │ ├─d90eba59ab375a824770ea3d27b9be3611215011ee7158e3d0814cd2eaf5792f │ │ └─11469 /manager --metrics-bind-address=:8080 │ ├─069c7ea47e57f822b558016254b5f5ebfe34c69f9a56d803745076ca9cd6ca47 │ │ ├─27511 apache2 -DFOREGROUND │ │ ├─27525 (wsgi:k -DFOREGROUND │ │ ├─27526 (wsgi:k -DFOREGROUND │ │ ├─27527 (wsgi:k -DFOREGROUND │ │ ├─27528 (wsgi:k -DFOREGROUND │ │ ├─27530 apache2 -DFOREGROUND │ │ ├─27531 apache2 -DFOREGROUND │ │ ├─27533 apache2 -DFOREGROUND │ │ ├─27536 apache2 -DFOREGROUND │ │ ├─27537 apache2 -DFOREGROUND │ │ ├─27538 apache2 -DFOREGROUND │ │ ├─27539 apache2 -DFOREGROUND │ │ ├─27542 apache2 -DFOREGROUND │ │ ├─27543 apache2 -DFOREGROUND │ │ └─27544 apache2 -DFOREGROUND │ ├─012f5236f036e176670ac286a2775478ef7c1a2ae81493eebe7d70553b584e9b │ │ └─7303 /pause │ ├─add515bc1bf398bb710e4466e79cdb27a9a54e6622fb01927d6df82ed65f7450 │ │ └─4545 etcd --advertise-client-urls=https://199.19.213.100:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.100:2380 --initial-cluster=instance=https://199.19.213.100:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.100:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.100:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─7d992b678e3b485fb554d48332fbc737ab1f9c36fe6e5d0a5a29b3bb48c71e17 │ │ └─7416 /coredns -conf /etc/coredns/Corefile │ ├─3d6fdf258b5c7e8e674133a288111d5599ee63c28e9ab40d57f842ea6c3ea3f8 │ │ └─10445 /pause │ ├─2c77bcaa51d59944a639caa8b5b857cab9edb51c209fcad5b9241a5d2c29a4d3 │ │ └─30750 /pause │ ├─6ce794ba4b9023ee61aff9b853a384535bfc4360fd8b4e5e6ee285a3483b15e5 │ │ └─21198 /pause │ ├─ca38526094bc2ad59535bdaaaa737b45faed3b9e75991ab3b16d0591c87c0747 │ │ ├─10736 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10749 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10832 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─31677 nginx: worker process │ │ ├─31678 nginx: worker process │ │ └─31679 nginx: cache manager process │ ├─a1285d7fc0c6334c7e0bf5d82210cf72fb82194b20289f7c5d84aeba6377e7b9 │ │ └─14591 /bin/memcached_exporter │ ├─46ebd723a09be1f8bf01e8f4b3c0ed46a244912425f00e46a83ce4bdf21ec150 │ │ └─8271 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─75eb8b450d2a1ac457b0586644086f0a8fb567dc543ded3222328cd15f5711fc │ │ └─11526 /pause │ ├─a15eb0885602898ab6f8eb9b821a330b01d87d93034749624337c0106a560395 │ │ └─10782 /server │ ├─a4095093d343755234d6206e53b02e0f3a58984557da82caccc32f8fb7693b1b │ │ └─4827 /kube-vip manager │ ├─465d2e95fa42a9fc2de51f870e5079adf47222639d8e0c3d1ed50d1a3b8b53f7 │ │ └─8082 /pause │ ├─08cae73d93214c539e3aed39344dc4f622c4e7234f3b4d3521a5b6335e6d1a53 │ │ └─24262 /bin/oauth2-proxy │ ├─8b213f0eae9c04236bc6746b03ebb7716f27d1f73d1299432e5d64454432932b │ │ └─8154 /pause │ ├─84195c6e0c4fa4c8df379e7800c7861fa3e9bdb75bba1adeb53a64598558eb33 │ │ └─12545 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─1bc0fe37aea52133050f44ba2c5949105cc97e83599970132edbc6af4f472923 │ │ └─23842 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-100.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─d279c3278f6efef9397064ebf482886446bd529a54979a02207724b7065634d2 │ │ ├─12307 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13772 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─56578a826fae266be7adc6da1455191ea0920eecb8cd9b3112d2f64e24fc110c │ │ └─14122 /pause │ ├─6f48e27e3e113521c17f592de030d774569ee1d88c963b6b0b0e1efeccabc8e7 │ │ └─6876 /pause │ ├─715fb077a53391c61dc14e98939847169ebc5d046b8eddcc183e5b0e6be29cea │ │ ├─32072 apache2 -DFOREGROUND │ │ ├─34534 (wsgi:h -DFOREGROUND │ │ ├─34535 (wsgi:h -DFOREGROUND │ │ ├─34536 (wsgi:h -DFOREGROUND │ │ ├─34537 (wsgi:h -DFOREGROUND │ │ ├─34538 (wsgi:h -DFOREGROUND │ │ ├─34539 apache2 -DFOREGROUND │ │ └─34540 apache2 -DFOREGROUND │ ├─39b26f0218751846d8d8385011410752f6588b49e92131e02824740613fe1f5f │ │ └─23878 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─a13e55a2320f40072a0be30421bc8b989c766d66169e02826fa3ece70aa61461 │ │ └─4495 /pause │ ├─7d991f34521f9ef0bddf59620fefe37dbe1d30266f33f0126d794eac9440d503 │ │ └─14933 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─96fb4faf1c119b08dbb3194928db1958393bc990b047d2778704c27260763875 │ │ └─12447 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─0b350ae490b60b26df2b89b33ab3339f4290aef112769fb0df1b52f395d120d2 │ │ └─7621 /pause │ ├─35cc76cec04b7dbd0f7a186434fbe3d22d1b35b440ce08d11aa0229fc1679a9a │ │ ├─22316 python -u /app/sidecar.py │ │ ├─22512 python -u /app/sidecar.py │ │ └─22513 python -u /app/sidecar.py │ ├─e72586d1b942508bb4b5f38f40304df1a95b9ff7252b3aaabf45d2d2627aae80 │ │ └─4664 /pause │ ├─cb206c710932d72f6209cef8033cb348889576b0212cfccdcf6ea9001c6e201e │ │ └─4563 kube-apiserver --advertise-address=199.19.213.100 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─43a6357702c6a26d73037f183d3c075c2bedbb2e0809ce38d491a4aa65d0bd41 │ │ └─8198 /pause │ └─4fcc524c23c569708df322826ea1b510f0792e8ee9eb7973df355de6bd858f7f │ └─23916 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount