Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─615 /lib/systemd/systemd --user │ │ └─616 (sd-pam) │ ├─session-4.scope │ │ ├─1354 sshd: zuul [priv] │ │ └─1367 sshd: zuul@notty │ └─session-1.scope │ ├─ 612 sshd: zuul [priv] │ ├─ 630 sshd: zuul@notty │ ├─ 767 /usr/bin/python3 │ ├─ 1358 ssh: /home/zuul/.ansible/cp/199.204.45.144-22-zuul [mux] │ ├─37963 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-kbfngbcaapbwfqaugftkbmfeskcmpjti ; /usr/bin/python3'"'"' && sleep 0' │ ├─37964 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-kbfngbcaapbwfqaugftkbmfeskcmpjti ; /usr/bin/python3' && sleep 0 │ ├─37965 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-kbfngbcaapbwfqaugftkbmfeskcmpjti ; /usr/bin/python3 │ ├─37966 /bin/sh -c echo BECOME-SUCCESS-kbfngbcaapbwfqaugftkbmfeskcmpjti ; /usr/bin/python3 │ ├─37967 /usr/bin/python3 │ ├─37968 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37970 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2875 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4431 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5f17c4e4c1f93669e4f3de887d6b44d9697eaf7fc7555d4ed8e00f52d4a1cf04 -address /run/containerd/containerd.sock │ │ ├─ 4468 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 42ebbd382f72f3b75f8ffc800ee08c8febbdd7edf34f13cede37804114fff282 -address /run/containerd/containerd.sock │ │ ├─ 4469 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 910bfffea3e7678ef775849f6191de49d3ee76b6faee545f57fd387e70cc929d -address /run/containerd/containerd.sock │ │ ├─ 4471 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f86da416e46b5238f1375fd816be84a2dca13f6bafa42a6be905a244b1278596 -address /run/containerd/containerd.sock │ │ ├─ 4502 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 01020e288e54db507a992a92bb72e3ffa7bcde64e681ea31dd8a066229ca705e -address /run/containerd/containerd.sock │ │ ├─ 4994 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 05bc43b26fc77264029ca77a4fdbd535e782c995c4e977ef1d7f4396b9c10ec2 -address /run/containerd/containerd.sock │ │ ├─ 5657 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8a786a319190335ec17bfde0f21273e3d105e711309ec0b9962d241d7b63a48d -address /run/containerd/containerd.sock │ │ ├─ 5677 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 995683b7af653811ec7d73ddb0e0f8169d772ee7d263f70ee4d022dec5e66f31 -address /run/containerd/containerd.sock │ │ ├─ 7075 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7d2a6d7b36d3b52685d2e4e711a7466002a9bbac4c4a34fdb5a2620601e93798 -address /run/containerd/containerd.sock │ │ ├─ 7426 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f47d90b919b414096c45dd3d017d8e238782e62b49014416092c7b02d59c1ebc -address /run/containerd/containerd.sock │ │ ├─ 7477 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1a09eca553eb6da0fe0f3aa9c9f67425d03ec6be6158cba7712edc4217734641 -address /run/containerd/containerd.sock │ │ ├─ 7824 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f81a5811cf8205d84b04b93cf094784cc14f9d2cb7452c6ad6d71eb8be2d4bd6 -address /run/containerd/containerd.sock │ │ ├─ 8314 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1cb952ab6b2a6954b10cfde015f5997dedc409ab512e10805b3e4e6ec89a5bda -address /run/containerd/containerd.sock │ │ ├─ 8359 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7bdc64ecb48527b0deee83a9d8ce3817f5f81097e903fd903151cac61c831f96 -address /run/containerd/containerd.sock │ │ ├─ 8398 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b71f3a376db0d3921e8e4094741ba713ca159f1b3296cb86502ba68dcf97a3c4 -address /run/containerd/containerd.sock │ │ ├─10555 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6e24f2739f503067b1e3168e652e069541f53c01aa0169163dff00666c5a8a48 -address /run/containerd/containerd.sock │ │ ├─10615 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 07d7c5d8b7a9f931a1e6f40af683765da6475df88ba82271d2e1dfcaf36b5250 -address /run/containerd/containerd.sock │ │ ├─11251 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4a552007e0a80c269625b43c42585f6ad44811c088694dc59736234b0d76d6d3 -address /run/containerd/containerd.sock │ │ ├─11347 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0783059878270f370ba43ea664d351d2237ec6149d70f9aef43084a4d9844d59 -address /run/containerd/containerd.sock │ │ ├─11650 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f6d924fbee979c367b5ee27a4545350cfeaa31523026ef44129e0d8c2c077ff0 -address /run/containerd/containerd.sock │ │ ├─12014 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6b5ba81b6d4ba44cecd53b4fcaaf2db9632bf30bab81db2a46dc92d3eba00bdf -address /run/containerd/containerd.sock │ │ ├─12400 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c221496dab23f379923bf4213f3aff677ca1d9ea109ab5a13d4e618bbdc622d6 -address /run/containerd/containerd.sock │ │ ├─14078 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b8e5e0ce94237078684a17f06738356bf37212d59ce7109c770a8755262d8499 -address /run/containerd/containerd.sock │ │ ├─14694 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0e7592d61b3b6f08b211a97dceddd8003f3df6666976ce0a8f52c146b9b5c17b -address /run/containerd/containerd.sock │ │ ├─18003 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6e042fb3372461bff3f1e243e51d032871b7b5b3a4072598e2ba8006c96fd58f -address /run/containerd/containerd.sock │ │ ├─20520 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f7482ab3fcad104aa1a029796d22d612093e21bf7e5f747cad0f2b833c4d091a -address /run/containerd/containerd.sock │ │ ├─20639 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6cc9d1053b4af7ce90de2ea5da676881f164fd4dffae842b5a94dcbead2cf6a4 -address /run/containerd/containerd.sock │ │ ├─20678 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 639a380033fd3be99b4958204472d90ebfd110031ebb96b232779cb0dfd9e43b -address /run/containerd/containerd.sock │ │ ├─20723 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 11ea93b249dd1633c6574e3eb3c813e71821090e98eb0d96cdea65f2663f346c -address /run/containerd/containerd.sock │ │ ├─21915 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f5ce5aaa4741718bd23f946a0d015d95c006fc812a4bb12ac3eda05356d85cf5 -address /run/containerd/containerd.sock │ │ ├─21989 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 045fa9b75a0a85465ac4d59cb094767b00c308160ab0fea47b50914157366521 -address /run/containerd/containerd.sock │ │ ├─22749 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c77876f0f2281d7d776ffa6ad91e5885abfa89d78ff5f5f07ea06e98510c8dc6 -address /run/containerd/containerd.sock │ │ ├─23985 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0af07731826e663dfc46cc0a0b143550cb4cff8f94a744a1d477bb7f92013b4b -address /run/containerd/containerd.sock │ │ ├─29489 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ae66e4c2d0697f3ca06337c24f4d0c87980af62fbe64ed51a2f9270c7a836771 -address /run/containerd/containerd.sock │ │ ├─29663 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6738022b455d52f612766e7d6cdb3f79112f9f5e9f0757900036013aa94385b9 -address /run/containerd/containerd.sock │ │ └─29703 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1d8f4c595c17719559dd3ff7d7735eb798971ec28048efc531fc94ab7ac025ab -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1090 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─434 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─325 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─538 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─556 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─530 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4863 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.144 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─293 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─561 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1289 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─328 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─526 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─329 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─535 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─532 /lib/systemd/systemd-logind ├─k8s.io │ ├─0e7592d61b3b6f08b211a97dceddd8003f3df6666976ce0a8f52c146b9b5c17b │ │ └─14716 /pause │ ├─49711dfc9158a6d914b2006a47dfb05d37f77971fae98284d71f8420acb19d7e │ │ └─8608 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─6e042fb3372461bff3f1e243e51d032871b7b5b3a4072598e2ba8006c96fd58f │ │ └─18027 /pause │ ├─c7c230c2e13c846724631fe6d40c0609964731298e7ab9a23bacff4da78e61e7 │ │ └─22956 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─d7988ebf55cc0071b79adffcf49aec465e456b95bf84dacd55c0f7b5b6afeae7 │ │ └─4698 kube-apiserver --advertise-address=199.204.45.144 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─f3ed124dafdeb907d7a32e57fccdcbc793d9a2efd4083b31e05652dfee219179 │ │ └─8569 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─c4a52b0596d17f1a12269bca8f678c9b01442b5e6d13ceaf461cc6f83de861ce │ │ └─22837 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─639a380033fd3be99b4958204472d90ebfd110031ebb96b232779cb0dfd9e43b │ │ └─20707 /pause │ ├─063830b83dbe0a7c8481a3200f7b0ba1293f95ca623a4b420b81c7969e099652 │ │ └─7128 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─6e24f2739f503067b1e3168e652e069541f53c01aa0169163dff00666c5a8a48 │ │ └─10584 /pause │ ├─0783059878270f370ba43ea664d351d2237ec6149d70f9aef43084a4d9844d59 │ │ └─11371 /pause │ ├─7840e37145b332ac7a716ea2a9b158e5716c9576a729b52bbd4379649a0926c2 │ │ └─6176 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─1d8f4c595c17719559dd3ff7d7735eb798971ec28048efc531fc94ab7ac025ab │ │ └─29726 /pause │ ├─5f17c4e4c1f93669e4f3de887d6b44d9697eaf7fc7555d4ed8e00f52d4a1cf04 │ │ └─4551 /pause │ ├─ed401c689014c39e4bb07d9cff08860d7bc81b4e20c19b15e2969685336564ac │ │ └─21550 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─e926f886b31cf7f9709c2e711a241e0c65aad72d1dfd433e09f6390b3bd2b4cd │ │ └─18144 /secretgen-controller │ ├─db3a2609c3fe15de53197e998454abc80e96ac16d56e79685bb6f24e99301c14 │ │ └─7899 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─ced36d07b2ba9fae2f1bf8f758dcc9c78fd3b1decdb681e9e21d1616eee0dbbe │ │ └─4714 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─8a786a319190335ec17bfde0f21273e3d105e711309ec0b9962d241d7b63a48d │ │ └─5707 /pause │ ├─a06a93ffc2e1a6630a75bb8d9cdbcb4fe5e95657fc594aa8aaa81661d4297d43 │ │ └─8530 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─b8e5e0ce94237078684a17f06738356bf37212d59ce7109c770a8755262d8499 │ │ └─14102 /pause │ ├─9616b77d684bbd45ce1b7b82cc12d96746c6f97e49b60317c331e4fb080932a9 │ │ └─11415 /manager --metrics-bind-address=:9782 │ ├─0af07731826e663dfc46cc0a0b143550cb4cff8f94a744a1d477bb7f92013b4b │ │ └─24013 /pause │ ├─d418d3408c8f9fbb980febe0fa73bb18d09c50aa552f02088262cc2652b57a7d │ │ └─7564 /coredns -conf /etc/coredns/Corefile │ ├─fd64ba0e55b67a9e28a926fa380ff661ef73783d742b2c2b6d1ec1b9ddb93d33 │ │ ├─26419 apache2 -DFOREGROUND │ │ ├─26473 (wsgi:k -DFOREGROUND │ │ ├─26474 (wsgi:k -DFOREGROUND │ │ ├─26475 (wsgi:k -DFOREGROUND │ │ ├─26476 (wsgi:k -DFOREGROUND │ │ ├─26480 apache2 -DFOREGROUND │ │ ├─26481 apache2 -DFOREGROUND │ │ ├─26483 apache2 -DFOREGROUND │ │ ├─26485 apache2 -DFOREGROUND │ │ ├─26487 apache2 -DFOREGROUND │ │ ├─26488 apache2 -DFOREGROUND │ │ ├─26489 apache2 -DFOREGROUND │ │ ├─26490 apache2 -DFOREGROUND │ │ ├─26491 apache2 -DFOREGROUND │ │ └─26492 apache2 -DFOREGROUND │ ├─33feb4a9d8536bd0e1d5e9ce3f56bd7cefffb4c67f56aaf3f9a5a3f48633616e │ │ ├─6377 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6739 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─2b569a8e5857d0e8661241b749c1baa9b5499e5195dd6105e0cbfd0ed6767b69 │ │ └─4672 etcd --advertise-client-urls=https://199.204.45.144:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.144:2380 --initial-cluster=instance=https://199.204.45.144:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.144:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.144:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─550d8ba673bab1720f10e14f7c11a305fa7a6d44f6477f1797c974a73ac57d8f │ │ └─20961 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─f7482ab3fcad104aa1a029796d22d612093e21bf7e5f747cad0f2b833c4d091a │ │ └─20575 /pause │ ├─045fa9b75a0a85465ac4d59cb094767b00c308160ab0fea47b50914157366521 │ │ └─22013 /pause │ ├─6b5ba81b6d4ba44cecd53b4fcaaf2db9632bf30bab81db2a46dc92d3eba00bdf │ │ └─12037 /pause │ ├─4d3025bb4aa395023a6769c82ac1929890ae13e6a69424932aa8f7328c787f74 │ │ └─11795 percona-xtradb-cluster-operator │ ├─74642713a1dd3255ad115da6b8361c9f3db4492ed4151c07d9e79721e5cd1119 │ │ └─22085 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─6aa45681cf80c6c75d1c82f729aeb55cbb9d20e174922dbd8d9c539e2d05bf8e │ │ ├─12594 mysqld --wsrep_start_position=c9e52beb-37c4-11f1-8318-4ab8f3a628fc:20 │ │ └─12719 /var/lib/mysql/mysql-state-monitor │ ├─05bc43b26fc77264029ca77a4fdbd535e782c995c4e977ef1d7f4396b9c10ec2 │ │ └─5018 /pause │ ├─f6d924fbee979c367b5ee27a4545350cfeaa31523026ef44129e0d8c2c077ff0 │ │ └─11674 /pause │ ├─f47d90b919b414096c45dd3d017d8e238782e62b49014416092c7b02d59c1ebc │ │ └─7451 /pause │ ├─a2d4c44c2df240bc791517bcab2d4edabcf99269fcbcb4982b55b43e84d7eec5 │ │ └─14491 /bin/memcached_exporter │ ├─f68e08ed625be5d76de23b2b6839fd38a7bb170e40f4767ed1e32214c54fa449 │ │ ├─23180 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23204 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─23212 erl_child_setup 1048576 │ │ ├─23245 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23246 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23256 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─23304 /bin/sh -s rabbit_disk_monitor │ ├─73adf7c8a4e9f0da4cb865ee4fbc33d3d6945f423a9cd6aa7fc237bdc8664702 │ │ └─10916 /server │ ├─e9ddf0ac9740862e40076ca105d4ccb5a734cea91146e2ad9cc3c5a059c5d12c │ │ ├─10847 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10860 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10984 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30697 nginx: worker process │ │ ├─30698 nginx: worker process │ │ └─30699 nginx: cache manager process │ ├─01020e288e54db507a992a92bb72e3ffa7bcde64e681ea31dd8a066229ca705e │ │ └─4610 /pause │ ├─c77876f0f2281d7d776ffa6ad91e5885abfa89d78ff5f5f07ea06e98510c8dc6 │ │ └─22772 /pause │ ├─6cc9d1053b4af7ce90de2ea5da676881f164fd4dffae842b5a94dcbead2cf6a4 │ │ └─20663 /pause │ ├─1cb952ab6b2a6954b10cfde015f5997dedc409ab512e10805b3e4e6ec89a5bda │ │ └─8338 /pause │ ├─f86da416e46b5238f1375fd816be84a2dca13f6bafa42a6be905a244b1278596 │ │ └─4566 /pause │ ├─e56e8d6b50793f948cd48310211890e54b14bb9b8fb6c6779f82d705557b3115 │ │ └─21208 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─76b632a874ad125ea5f2eb66999ce8af07e35cef70d0f92773d8762253bba659 │ │ └─23076 /bin/oauth2-proxy │ ├─435a20f8c11ef01e67cc8d46d366b06fefb51aea9f1f419c1b6bf70254edb249 │ │ └─22551 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-144.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─aeadab9a0daf1d10a5380437912fdf11f97dc6e945f65ebb316a901098607c9b │ │ └─4817 /kube-vip manager │ ├─42ebbd382f72f3b75f8ffc800ee08c8febbdd7edf34f13cede37804114fff282 │ │ └─4587 /pause │ ├─1db2aacfd9f28dfdb5ef01ab9b6019c5a2064204ba4d663d56bc77a99467ca73 │ │ ├─30953 apache2 -DFOREGROUND │ │ ├─33083 (wsgi:h -DFOREGROUND │ │ ├─33085 (wsgi:h -DFOREGROUND │ │ ├─33086 (wsgi:h -DFOREGROUND │ │ ├─33087 (wsgi:h -DFOREGROUND │ │ ├─33088 (wsgi:h -DFOREGROUND │ │ ├─33089 apache2 -DFOREGROUND │ │ └─33090 apache2 -DFOREGROUND │ ├─a142df49b55d7d09b6c18a16aaa647ebdef2a17433b5aa7cbca399f5b064f846 │ │ └─11512 /manager --metrics-bind-address=:8080 │ ├─1445d3b719e051435cc0f8366c5f7964e6d8c114f6ec063368732213ef00bbc1 │ │ └─5043 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─92342d593348fdb659cd5ce0c7f79a49b69ed7e848dc625b618a268ed4f154b6 │ │ └─22586 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─7d2a6d7b36d3b52685d2e4e711a7466002a9bbac4c4a34fdb5a2620601e93798 │ │ └─7099 /pause │ ├─b71f3a376db0d3921e8e4094741ba713ca159f1b3296cb86502ba68dcf97a3c4 │ │ └─8421 /pause │ ├─9b1ffebf8ac47a5221e9fee2898e07b41f6c5305a2bd5df1f3277861f28cb2ff │ │ └─22876 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─995683b7af653811ec7d73ddb0e0f8169d772ee7d263f70ee4d022dec5e66f31 │ │ └─5718 /pause │ ├─817704c580ae3d67cd24ce578c4b66571e46fa3622028cca928d0268eaf35405 │ │ ├─12451 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13646 haproxy -sf 14 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─dc0c299fc1579da68c7359360ba29f5af6ff15e86d49ae296565e9f4b2bab315 │ │ └─7490 /coredns -conf /etc/coredns/Corefile │ ├─bf942e231fe6fb33f19518835c53e880e023bff2c30742cfba82b2f96281f066 │ │ └─12523 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─811307665333899594f14b3110d072cc8e34b1e553c7a784562c1c9042438431 │ │ └─22803 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-144.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─05e4f67dad0c184cb450f85da63edd4969ccc0640829aba57f48e2cffec1f099 │ │ └─14438 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─665cae5da5c7b1bdbf53a6bf17003892e914360a97e88488d4007e72b1817135 │ │ ├─30935 apache2 -DFOREGROUND │ │ ├─32997 (wsgi:h -DFOREGROUND │ │ ├─32998 (wsgi:h -DFOREGROUND │ │ ├─33000 (wsgi:h -DFOREGROUND │ │ ├─33001 (wsgi:h -DFOREGROUND │ │ ├─33002 (wsgi:h -DFOREGROUND │ │ ├─33003 apache2 -DFOREGROUND │ │ └─33004 apache2 -DFOREGROUND │ ├─1a09eca553eb6da0fe0f3aa9c9f67425d03ec6be6158cba7712edc4217734641 │ │ └─7515 /pause │ ├─7bdc64ecb48527b0deee83a9d8ce3817f5f81097e903fd903151cac61c831f96 │ │ └─8384 /pause │ ├─f5ce5aaa4741718bd23f946a0d015d95c006fc812a4bb12ac3eda05356d85cf5 │ │ └─21940 /pause │ ├─11ea93b249dd1633c6574e3eb3c813e71821090e98eb0d96cdea65f2663f346c │ │ └─20754 /pause │ ├─2818cd9f754048f81631d7fcf9984026282c522d4da5eed798290303112007bc │ │ ├─21123 python -u /app/sidecar.py │ │ ├─21425 python -u /app/sidecar.py │ │ └─21426 python -u /app/sidecar.py │ ├─6738022b455d52f612766e7d6cdb3f79112f9f5e9f0757900036013aa94385b9 │ │ └─29692 /pause │ ├─910d408220241a9309d4020aced5ea634182a660aa96cb1f8d16a86b992c5636 │ │ └─12695 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─7a6213a53b25943278e796ffa629b1587d3a650780c24ef1485723f7909095fd │ │ ├─30917 apache2 -DFOREGROUND │ │ ├─33097 (wsgi:h -DFOREGROUND │ │ ├─33098 (wsgi:h -DFOREGROUND │ │ ├─33099 (wsgi:h -DFOREGROUND │ │ ├─33100 (wsgi:h -DFOREGROUND │ │ ├─33101 (wsgi:h -DFOREGROUND │ │ ├─33102 apache2 -DFOREGROUND │ │ └─33103 apache2 -DFOREGROUND │ ├─4a552007e0a80c269625b43c42585f6ad44811c088694dc59736234b0d76d6d3 │ │ └─11275 /pause │ ├─7089c83a67bbb1595ae1c723147d2dead67a0b690e4bb569f231c06f80f3acf2 │ │ └─14799 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─e82bb2eda35b09f98cb8f8412d77cc066caae2156c65c69dd5ee0da796305fb4 │ │ └─4729 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─851389774655af25cd66eaa143c02a4e275581ad001f22ece0c4407bb695d4e5 │ │ ├─21149 python -u /app/sidecar.py │ │ ├─21427 python -u /app/sidecar.py │ │ └─21428 python -u /app/sidecar.py │ ├─07d7c5d8b7a9f931a1e6f40af683765da6475df88ba82271d2e1dfcaf36b5250 │ │ └─10639 /pause │ ├─6708eaf9306269fa5e7bf7296dd724ef610082a55a42ce7fd1b09384734141a5 │ │ └─22910 /bin/oauth2-proxy │ ├─910bfffea3e7678ef775849f6191de49d3ee76b6faee545f57fd387e70cc929d │ │ └─4585 /pause │ ├─c221496dab23f379923bf4213f3aff677ca1d9ea109ab5a13d4e618bbdc622d6 │ │ └─12423 /pause │ ├─ae66e4c2d0697f3ca06337c24f4d0c87980af62fbe64ed51a2f9270c7a836771 │ │ └─29520 /pause │ └─f81a5811cf8205d84b04b93cf094784cc14f9d2cb7452c6ad6d71eb8be2d4bd6 │ └─7849 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount