Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─614 /lib/systemd/systemd --user │ │ └─615 (sd-pam) │ ├─session-4.scope │ │ ├─1355 sshd: zuul [priv] │ │ └─1368 sshd: zuul@notty │ └─session-1.scope │ ├─ 611 sshd: zuul [priv] │ ├─ 628 sshd: zuul@notty │ ├─ 765 /usr/bin/python3 │ ├─ 1359 ssh: /home/zuul/.ansible/cp/199.19.213.249-22-zuul [mux] │ ├─39232 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-alkauqndclngqrlcnniykuttpomtfzgd ; /usr/bin/python3'"'"' && sleep 0' │ ├─39233 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-alkauqndclngqrlcnniykuttpomtfzgd ; /usr/bin/python3' && sleep 0 │ ├─39234 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-alkauqndclngqrlcnniykuttpomtfzgd ; /usr/bin/python3 │ ├─39235 /bin/sh -c echo BECOME-SUCCESS-alkauqndclngqrlcnniykuttpomtfzgd ; /usr/bin/python3 │ ├─39236 /usr/bin/python3 │ ├─39237 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─39239 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2876 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4481 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 32256355afa85f34b2d24d494c95c44b4e2fdf6d266d80bcbc57587b5f26e7d2 -address /run/containerd/containerd.sock │ │ ├─ 4484 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5f633a1b4c5fb7a013f25cc91b5d97e7295b85ae0bb5c62cdedbfc6969a87e37 -address /run/containerd/containerd.sock │ │ ├─ 4492 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 655240d58f52a00d4064149d1b8ef7f3edb7f3614af35546bf3a6bca7e968fdd -address /run/containerd/containerd.sock │ │ ├─ 4507 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c4d67184686470c43f5cc407075f07a86bb155b15c6c0460a0a2c6a5b9bd2fb6 -address /run/containerd/containerd.sock │ │ ├─ 4511 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3c95020cbfa70340fc9b84d9d0b5284383c84e6d9b268fbf46c07addccc86c5c -address /run/containerd/containerd.sock │ │ ├─ 5035 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f5c8d5244a7480ff95530657c08799556289305158d160e825f767932cde2fe5 -address /run/containerd/containerd.sock │ │ ├─ 5711 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0a7e86d18036857252a43799a8d7cab938751992360ff5e336b1da7cc62fc946 -address /run/containerd/containerd.sock │ │ ├─ 5733 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4add16178859478618afc904262d109e4c3081fd55c443da3c49f559fcb1d347 -address /run/containerd/containerd.sock │ │ ├─ 6879 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0afe4aad9f4a93d8771965eb8a6c20b22a5aea0ba0da44041666262f277ceccc -address /run/containerd/containerd.sock │ │ ├─ 7256 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 63da2a6a3942f609404dd649bbe5ccffc772b740d4197542be7b5593332ea2e2 -address /run/containerd/containerd.sock │ │ ├─ 7321 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b7d59520369890a2e14dd6bcc1547151ff94d520da18ab6f8cb980f167aba178 -address /run/containerd/containerd.sock │ │ ├─ 7650 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4e9b9124f5abfd85ac2dc92dd205bd4a9b6fde7fb55ab2e801d520ad2796c793 -address /run/containerd/containerd.sock │ │ ├─ 8114 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 06335bf93030ef060bdab7bd0fd9ae3c516fa123331578f0cf53850f4469f633 -address /run/containerd/containerd.sock │ │ ├─ 8153 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7e8a2f48df9c74081c411db3cfdf8e865d2df8aa1ebe38574c0a076a22d89cd5 -address /run/containerd/containerd.sock │ │ ├─ 8200 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cfa7dc7b7cd62114cbfb94c44f8badfdfe28d75871d67770ab18b1def37b1cf7 -address /run/containerd/containerd.sock │ │ ├─10360 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 512d91a9a4a45b9027824c676ea93bc0cb2bf3263f320a1bfffc65e1d92cce7b -address /run/containerd/containerd.sock │ │ ├─10419 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cb7ceab4e464ce74e37dc33242989ffe8b9005d6f882b5510dff10e22ea62681 -address /run/containerd/containerd.sock │ │ ├─11259 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b4e1ebeae5158cfceb42ee89146248962002aeb10ac05dad330142c14f8d60ae -address /run/containerd/containerd.sock │ │ ├─11332 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5efb6651cdb886e591daa7f1f9d4c96efbfdb435f688135e7cbf7c23cb7c368a -address /run/containerd/containerd.sock │ │ ├─11570 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 11858e066dddee34bbe6e98d7da648bd9f1cb1b09dcfea108ee67af17ef17f73 -address /run/containerd/containerd.sock │ │ ├─11878 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 24c234facde13d9485e7882e0962bfcb996c67c5aa1a589864571227c033bf70 -address /run/containerd/containerd.sock │ │ ├─12260 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d25eb778b18c7a05f0d71ea80b9ff89b3cb9aa609e5b69b1b541151616a32758 -address /run/containerd/containerd.sock │ │ ├─14158 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3f4222409256dd114be2c006e17d86b118783b250ec431cad606c326f5eaef25 -address /run/containerd/containerd.sock │ │ ├─14819 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e2eb8295a1fc22802b05f01b0b415cf722d4992fd0c2711a4575c9435845364b -address /run/containerd/containerd.sock │ │ ├─18567 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 947aa733aeb422698c5f8cf2bb17adc2cf63ea1ab4e72efd921f2301b4d20731 -address /run/containerd/containerd.sock │ │ ├─21236 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ee03c989ce6d037325e7cca9ec5b391edb25678e41c0342b1f853afd6885da07 -address /run/containerd/containerd.sock │ │ ├─21381 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9d49f6d2b2ba85a8d861b5aad50336755edfc5f6760574780877e1a9d810dda6 -address /run/containerd/containerd.sock │ │ ├─21419 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9fce1074c2f626b50aaa38734b115ee9596ef25b1d353fc7bb0b9582e5ef977f -address /run/containerd/containerd.sock │ │ ├─21440 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 889cbd2e83dc3c02c1c833cf6af8278db7e73cf28ed3e9b4300ed42b3b3c0758 -address /run/containerd/containerd.sock │ │ ├─22992 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a06bb4ce0797363be119ed46e3ae1656aa146e7cf4d8cf8c707405333c0f3637 -address /run/containerd/containerd.sock │ │ ├─23139 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5aaa61ec1da2cd62d74b0c34074095ee61c7bbf4c4774b55fe716dbfe79e2031 -address /run/containerd/containerd.sock │ │ ├─23693 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9b75bc6bf50f4b3d654b73bda7895d765fd0c41cdcc374339699a337c2a40d70 -address /run/containerd/containerd.sock │ │ ├─25271 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e28f3cb0edfc99787918f1c009ce140bb27dee6aa242b144af8d87c3fa950d9a -address /run/containerd/containerd.sock │ │ ├─30751 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bc7a0f22ee2671d5684a32f1b2725a95e3d2a9b03db812c7cd7e1d96f5ec5474 -address /run/containerd/containerd.sock │ │ ├─30817 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 769bb6483d775d1ef4b2cf7badf4f894eb2782f710fc0a9221bf44cd6c28bb0d -address /run/containerd/containerd.sock │ │ └─30916 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e3bc7fc81db34222dd35803b874ec48528d7e4df4d597ea3479abf97c1fdae66 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1088 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─436 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─329 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─542 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─554 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─533 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4900 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.249 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─295 /lib/systemd/systemd-journald │ ├─ssh.service │ │ ├─ 561 sshd: /usr/sbin/sshd -D [listener] 1 of 10-100 startups │ │ ├─39208 sshd: unknown [priv] │ │ └─39209 sshd: unknown [net] │ ├─uuidd.service │ │ └─1290 /usr/sbin/uuidd --socket-activation │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─540 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─384caa3bd7d10164d2fe922fa719dfa6a4553b45f314d78674945abc757a45f4 │ │ └─8373 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─d7aae35f6ded4dffb3d738daaecc87983ee5058e6811f734ef68a613f4d79892 │ │ └─11617 /manager --metrics-bind-address=:9782 │ ├─edf083606807fc2a0592509bbb7e485ebe2a920f95ebdd69e478bb2bb61d0dcb │ │ └─14935 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─5f633a1b4c5fb7a013f25cc91b5d97e7295b85ae0bb5c62cdedbfc6969a87e37 │ │ └─4599 /pause │ ├─0e61b3fce8e9101dd44999702ba651550c81067e734910f674afcbd022698bde │ │ ├─10655 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10668 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10772 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─32106 nginx: worker process │ │ ├─32107 nginx: worker process │ │ └─32108 nginx: cache manager process │ ├─11858e066dddee34bbe6e98d7da648bd9f1cb1b09dcfea108ee67af17ef17f73 │ │ └─11594 /pause │ ├─3f4222409256dd114be2c006e17d86b118783b250ec431cad606c326f5eaef25 │ │ └─14183 /pause │ ├─a8983949b023607326e8dfbaa53315a7e647c0c13a5d7d98c8808d0f1004b973 │ │ └─4846 /kube-vip manager │ ├─81c7d1a687c597761bd79680323383c74ba32a6f2ac1e37ed612e3aef8f45fc7 │ │ └─23804 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─3c95020cbfa70340fc9b84d9d0b5284383c84e6d9b268fbf46c07addccc86c5c │ │ └─4621 /pause │ ├─7e8a2f48df9c74081c411db3cfdf8e865d2df8aa1ebe38574c0a076a22d89cd5 │ │ └─8178 /pause │ ├─5aaa61ec1da2cd62d74b0c34074095ee61c7bbf4c4774b55fe716dbfe79e2031 │ │ └─23162 /pause │ ├─32256355afa85f34b2d24d494c95c44b4e2fdf6d266d80bcbc57587b5f26e7d2 │ │ └─4595 /pause │ ├─0054486bdd71e30fe02e8fae36683e633da1d01f5eae3345677ede3205318752 │ │ └─12382 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─13cf0910e68eaf30fb696556ccd54d19bda68f02282c7f2958d5e0c6f8cf84f7 │ │ └─4722 etcd --advertise-client-urls=https://199.19.213.249:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.249:2380 --initial-cluster=instance=https://199.19.213.249:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.249:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.249:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─fc434bb79c89dded4590a7bba83f05880830414cc2ce523eeb2aa4676d0f85fa │ │ └─21763 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─9f941a7bec8facc7abe789cf7c093bcbe18740bb6b2d1efbdf787136b92887ee │ │ └─23509 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─b4e1ebeae5158cfceb42ee89146248962002aeb10ac05dad330142c14f8d60ae │ │ └─11283 /pause │ ├─e3bc7fc81db34222dd35803b874ec48528d7e4df4d597ea3479abf97c1fdae66 │ │ └─30944 /pause │ ├─d0e1de23118d430538295ac1ccfb7f104ecf285dad89b3bc75226f2737882440 │ │ ├─32295 apache2 -DFOREGROUND │ │ ├─34205 (wsgi:h -DFOREGROUND │ │ ├─34206 (wsgi:h -DFOREGROUND │ │ ├─34207 (wsgi:h -DFOREGROUND │ │ ├─34208 (wsgi:h -DFOREGROUND │ │ ├─34209 (wsgi:h -DFOREGROUND │ │ ├─34210 apache2 -DFOREGROUND │ │ └─34211 apache2 -DFOREGROUND │ ├─ad3b3f69c370711e9504f620f6fec5643a9cd61748c214002a0dbe5f8ef6befe │ │ ├─22037 python -u /app/sidecar.py │ │ ├─22134 python -u /app/sidecar.py │ │ └─22135 python -u /app/sidecar.py │ ├─06335bf93030ef060bdab7bd0fd9ae3c516fa123331578f0cf53850f4469f633 │ │ └─8139 /pause │ ├─4fb75721017c8341785d7280bf8cefdf6defbe88d5c409951696be8de750d567 │ │ └─18629 /secretgen-controller │ ├─4be9a93f698a9b3fca4318a7dc3f13633c93ad2659897b84570d4b58cbfd9753 │ │ └─7386 /coredns -conf /etc/coredns/Corefile │ ├─5efb6651cdb886e591daa7f1f9d4c96efbfdb435f688135e7cbf7c23cb7c368a │ │ └─11356 /pause │ ├─33b3a1e37519672057b9c9af1787b81432a8b7d3ef818e9b61c5d75e0a264868 │ │ └─12581 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─4add16178859478618afc904262d109e4c3081fd55c443da3c49f559fcb1d347 │ │ └─5775 /pause │ ├─9b75bc6bf50f4b3d654b73bda7895d765fd0c41cdcc374339699a337c2a40d70 │ │ └─23718 /pause │ ├─655240d58f52a00d4064149d1b8ef7f3edb7f3614af35546bf3a6bca7e968fdd │ │ └─4610 /pause │ ├─a06bb4ce0797363be119ed46e3ae1656aa146e7cf4d8cf8c707405333c0f3637 │ │ └─23048 /pause │ ├─cef3d1dc21f6bf0cd51231bc2ff4d1386c8f8238948b698736913144cacf0831 │ │ ├─24203 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─24220 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─24226 erl_child_setup 1048576 │ │ ├─24268 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─24269 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─24279 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─24363 /bin/sh -s rabbit_disk_monitor │ ├─285404c31620c27066f818f0803117497d397f05a5da22a763b9d4cf45cbe41c │ │ ├─32332 apache2 -DFOREGROUND │ │ ├─34332 (wsgi:h -DFOREGROUND │ │ ├─34333 (wsgi:h -DFOREGROUND │ │ ├─34334 (wsgi:h -DFOREGROUND │ │ ├─34335 (wsgi:h -DFOREGROUND │ │ ├─34336 (wsgi:h -DFOREGROUND │ │ ├─34337 apache2 -DFOREGROUND │ │ └─34338 apache2 -DFOREGROUND │ ├─790e95296981dbbd5a57faeec684977f4eba6fc9d08a1bc046acda9b67a3a4f4 │ │ └─14536 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─b7d59520369890a2e14dd6bcc1547151ff94d520da18ab6f8cb980f167aba178 │ │ └─7352 /pause │ ├─170dc19571b18b297e2a4f257cbce5abb996d6b4937b1841aba1ca8e3891e694 │ │ ├─21985 python -u /app/sidecar.py │ │ ├─22120 python -u /app/sidecar.py │ │ └─22121 python -u /app/sidecar.py │ ├─598445e136054a3cecd1619ea4d1a65d8961615f007f5c3229fffd1fcbe26004 │ │ └─4709 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─eb1ef7aeacf3d27d9e5fbe6de93a5721da669538088a2bdb94681d6899af688b │ │ └─4741 kube-apiserver --advertise-address=199.19.213.249 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─30809692835c84f9fe8ea0666f42234ba6cda70f41baee851fbc37852cbed923 │ │ └─5964 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─6acc3078ba6b7ac84d51c1046f0f1c45fc9657c43d1eafdcbc8cb179efe75c5e │ │ └─23475 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-249.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─366e307e42c679ce4635b7a699a03291207fad6b485ff0be9040986190212aa7 │ │ └─14598 /bin/memcached_exporter │ ├─e2eb8295a1fc22802b05f01b0b415cf722d4992fd0c2711a4575c9435845364b │ │ └─14843 /pause │ ├─b9c52f03fc574aac75c370f9f438fa8a18b49e1fd7cec157594f27a4d655452a │ │ ├─12312 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13734 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─07f71c0ef7727800715b34ebb5f0e3fa70b84acd3948eca11d3abb880d41fc00 │ │ └─8410 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─b3db5865ec69e4b0a98eea75ecf8a8c09ad37c933405edcb8ec35657c1950de1 │ │ └─11751 percona-xtradb-cluster-operator │ ├─faa22f448997b55ac4d49d770b4c47e347c65ebae107fb93631e2590a7df0ef9 │ │ └─7306 /coredns -conf /etc/coredns/Corefile │ ├─63da2a6a3942f609404dd649bbe5ccffc772b740d4197542be7b5593332ea2e2 │ │ └─7280 /pause │ ├─9fce1074c2f626b50aaa38734b115ee9596ef25b1d353fc7bb0b9582e5ef977f │ │ └─21456 /pause │ ├─566de1752fa1d477504e0e105e3b5f001da6019c6c76575f52c8ba67b82991a7 │ │ └─22563 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─6b06606cd2c00aab8ca8079d8a9287d081e32b3e61b60584fb5d8b65ffb4aeb7 │ │ └─6930 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─2c95f53b12d5dbc8e2d1b67e41c29dbed18f0cc5ecf43beaf10100fa415ff504 │ │ └─5085 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─7450c922b802ab016d236da6aff80a089d18c589473c6ebf4ca8b445d7cf6943 │ │ └─4760 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─2ab51aa00bfc19acfbd0b78e6f7fcfa26316d3259cd9255c920c495cbcd7e24d │ │ └─23559 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─ee03c989ce6d037325e7cca9ec5b391edb25678e41c0342b1f853afd6885da07 │ │ └─21293 /pause │ ├─0afe4aad9f4a93d8771965eb8a6c20b22a5aea0ba0da44041666262f277ceccc │ │ └─6904 /pause │ ├─9d49f6d2b2ba85a8d861b5aad50336755edfc5f6760574780877e1a9d810dda6 │ │ └─21405 /pause │ ├─2216f29f98c24f8b331b786d0891deb3515467e09e9d36e02d334ffd43063521 │ │ └─23879 /bin/oauth2-proxy │ ├─cf3d45f6f9699bfc429785b6089b48313aab05b452f4202b4268090be014de95 │ │ └─23768 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-249.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─d25eb778b18c7a05f0d71ea80b9ff89b3cb9aa609e5b69b1b541151616a32758 │ │ └─12285 /pause │ ├─0a7e86d18036857252a43799a8d7cab938751992360ff5e336b1da7cc62fc946 │ │ └─5754 /pause │ ├─2b2d5960a6d358d8a6c6aa653c8fe70167f5b0da5d3d3523e09115002fcbe7a2 │ │ └─7737 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─2af99f80c16de4729c45dc8b4ba9fc98acd087266a09d8b6c05db66048e7910e │ │ └─23225 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─f5c8d5244a7480ff95530657c08799556289305158d160e825f767932cde2fe5 │ │ └─5058 /pause │ ├─14bb67611fffa42dfdb5036aad41eaddbd3521009bdf6433c4c7a429f63aa5cb │ │ └─10693 /server │ ├─cfa7dc7b7cd62114cbfb94c44f8badfdfe28d75871d67770ab18b1def37b1cf7 │ │ └─8229 /pause │ ├─c638038d1f6855ec1146a32f57c18f80c34db140e3dab8bfcde3d9b7e45fcd5e │ │ ├─32299 apache2 -DFOREGROUND │ │ ├─34219 (wsgi:h -DFOREGROUND │ │ ├─34220 (wsgi:h -DFOREGROUND │ │ ├─34221 (wsgi:h -DFOREGROUND │ │ ├─34222 (wsgi:h -DFOREGROUND │ │ ├─34224 (wsgi:h -DFOREGROUND │ │ ├─34225 apache2 -DFOREGROUND │ │ └─34226 apache2 -DFOREGROUND │ ├─139dda414e7b92fbc0ecf0131661b3d75be1eae2d6db3acace0b506344cea655 │ │ └─11407 /manager --metrics-bind-address=:8080 │ ├─512d91a9a4a45b9027824c676ea93bc0cb2bf3263f320a1bfffc65e1d92cce7b │ │ └─10391 /pause │ ├─c521ff671c6cbd74b5655ac9a0c3bfeda8ffeb88f1510770cb6e0b72df5795a1 │ │ ├─12484 mysqld --wsrep_start_position=247528af-3bdf-11f1-9c29-7601c5c6eda8:20 │ │ └─12605 /var/lib/mysql/mysql-state-monitor │ ├─769bb6483d775d1ef4b2cf7badf4f894eb2782f710fc0a9221bf44cd6c28bb0d │ │ └─30856 /pause │ ├─07cd1a1ee01f7817933a1c61ff162d52937cbbde2363d053ec0419914cc5fad4 │ │ ├─6158 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6522 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─889cbd2e83dc3c02c1c833cf6af8278db7e73cf28ed3e9b4300ed42b3b3c0758 │ │ └─21485 /pause │ ├─24c234facde13d9485e7882e0962bfcb996c67c5aa1a589864571227c033bf70 │ │ └─11903 /pause │ ├─947aa733aeb422698c5f8cf2bb17adc2cf63ea1ab4e72efd921f2301b4d20731 │ │ └─18591 /pause │ ├─652aff11df6646398528a138df409d9ef8394ebc85d35ce9ba66a9a8b2154f48 │ │ └─8334 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─bc7a0f22ee2671d5684a32f1b2725a95e3d2a9b03db812c7cd7e1d96f5ec5474 │ │ └─30781 /pause │ ├─d73b3e72a8508350e9c47620b9098e793045949f5d164aea25794e73518c1e26 │ │ └─24066 /bin/oauth2-proxy │ ├─cb7ceab4e464ce74e37dc33242989ffe8b9005d6f882b5510dff10e22ea62681 │ │ └─10443 /pause │ ├─4e9b9124f5abfd85ac2dc92dd205bd4a9b6fde7fb55ab2e801d520ad2796c793 │ │ └─7675 /pause │ ├─e28f3cb0edfc99787918f1c009ce140bb27dee6aa242b144af8d87c3fa950d9a │ │ └─25294 /pause │ ├─e3fa5eecfefe0b278d78e98607293c0d96cf9d5349e7d6df862d2aa835a90404 │ │ └─23844 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─c4d67184686470c43f5cc407075f07a86bb155b15c6c0460a0a2c6a5b9bd2fb6 │ │ └─4601 /pause │ ├─17d2233225dbbe8f1a9dc8e3b4fda7c60d1480b0c94dfc60152daa3c035efe0e │ │ ├─27676 apache2 -DFOREGROUND │ │ ├─27703 (wsgi:k -DFOREGROUND │ │ ├─27704 (wsgi:k -DFOREGROUND │ │ ├─27705 (wsgi:k -DFOREGROUND │ │ ├─27706 (wsgi:k -DFOREGROUND │ │ ├─27709 apache2 -DFOREGROUND │ │ ├─27710 apache2 -DFOREGROUND │ │ ├─27712 apache2 -DFOREGROUND │ │ ├─27714 apache2 -DFOREGROUND │ │ ├─27715 apache2 -DFOREGROUND │ │ ├─27716 apache2 -DFOREGROUND │ │ ├─27717 apache2 -DFOREGROUND │ │ ├─27718 apache2 -DFOREGROUND │ │ ├─27720 apache2 -DFOREGROUND │ │ └─27722 apache2 -DFOREGROUND │ └─2e3cbe5e33fca126d0b516c9c9a572bc3080ee2bbe133fdfe7a8bb40a308309a │ └─22176 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount