Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─620 /lib/systemd/systemd --user │ │ └─621 (sd-pam) │ ├─session-4.scope │ │ ├─1360 sshd: zuul [priv] │ │ └─1373 sshd: zuul@notty │ └─session-1.scope │ ├─ 617 sshd: zuul [priv] │ ├─ 634 sshd: zuul@notty │ ├─ 771 /usr/bin/python3 │ ├─ 1364 ssh: /home/zuul/.ansible/cp/199.19.213.212-22-zuul [mux] │ ├─38775 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-srfgkwbrdqnpxlrekywlxuinylbwjvwa ; /usr/bin/python3'"'"' && sleep 0' │ ├─38776 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-srfgkwbrdqnpxlrekywlxuinylbwjvwa ; /usr/bin/python3' && sleep 0 │ ├─38777 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-srfgkwbrdqnpxlrekywlxuinylbwjvwa ; /usr/bin/python3 │ ├─38778 /bin/sh -c echo BECOME-SUCCESS-srfgkwbrdqnpxlrekywlxuinylbwjvwa ; /usr/bin/python3 │ ├─38779 /usr/bin/python3 │ ├─38780 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38782 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2882 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4455 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4dc9f95a81061bc6502cd3f56050c4213ccaabcea0001ea5e280ff0950927e6b -address /run/containerd/containerd.sock │ │ ├─ 4484 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 12a68f95b7f8830894132acf98fc391067a71f01249d643c86e4426dddc15d1e -address /run/containerd/containerd.sock │ │ ├─ 4486 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aeac86b4ea77604eff51cfec0c3579bac42a99b593afd2979b5dbc8ef61fd1cb -address /run/containerd/containerd.sock │ │ ├─ 4515 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 92a2b57881e48bc39ef70ea5dec92fad9b39b262a68db83ebbeb072c4c7abd89 -address /run/containerd/containerd.sock │ │ ├─ 4519 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 71c72a9a6c9415c747c931bea41e424e2c8da6b1a1e03906d4a1ab552c92534b -address /run/containerd/containerd.sock │ │ ├─ 4988 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0a994d15d05ab09fabd4e9fd95059f358b9af2c340120f685caeb5c9e61c4a91 -address /run/containerd/containerd.sock │ │ ├─ 5696 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 68ab6d0019a3c7c8b2c2eb5856f31f643728021dd3f2954c65d86a913a109013 -address /run/containerd/containerd.sock │ │ ├─ 5768 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 87921cb7e585bb1defb9345cb58637c99ab45bf3e8ebaa03f1241df796e74e78 -address /run/containerd/containerd.sock │ │ ├─ 7076 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b0d33bfbac3a917a65b9ef041395d32dcca990daedcc5006a594db7d83af4326 -address /run/containerd/containerd.sock │ │ ├─ 7438 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a9a360ded223f85513a124e9d643cc9da009e098af132dcc41eaa8e7359665f7 -address /run/containerd/containerd.sock │ │ ├─ 7477 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d4699b8862524003305e0ffa60b95170c692decfd03a9bec9faeaa2d0d8f1db0 -address /run/containerd/containerd.sock │ │ ├─ 7846 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bf18f029ef85e27b309d4ac2510478f9f88121dbc45c75308f757b4544989124 -address /run/containerd/containerd.sock │ │ ├─ 8388 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d820a5152ae6d16f29fa4a62f17f42c6f33ec80c7eb8a58fb593a63fba5cfb7e -address /run/containerd/containerd.sock │ │ ├─ 8432 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9e7e649136a1422288e7cbdaa2ea44ad1c3808a9420cd2a885faa2f924aebda7 -address /run/containerd/containerd.sock │ │ ├─ 8470 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d1c98db8bc171b741815e8c06237e4bfd86f3ece44de5d64ea639312d9c3bfa9 -address /run/containerd/containerd.sock │ │ ├─10672 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7519a1b4a68f87c7e1a7c33906e7b75b67ca49ab101722889d3899d523f0921b -address /run/containerd/containerd.sock │ │ ├─10784 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 10cac09eb57ee5917f71686012143367410fe5c8a5e60eb6c65e90fbe2cb52ac -address /run/containerd/containerd.sock │ │ ├─11375 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3ce0e5bad6d553fe5a7bfb794f61647e3305ae2e6be04059ef1009bc90dbb46b -address /run/containerd/containerd.sock │ │ ├─11462 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9d1e66be7c4b69cb752c6fb416e5f6d0acd729e6653b73a02c189da577e1a932 -address /run/containerd/containerd.sock │ │ ├─11765 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 395cc5de3b68ad4d9e243902c4be76cad737c354e3dbfc05b53b1c648b7d2723 -address /run/containerd/containerd.sock │ │ ├─12036 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 51cb999eca067cff30f4da347f92f9064ffac58d494776a3beb6d0a373900e6f -address /run/containerd/containerd.sock │ │ ├─12408 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4bc9fb82102190972f3bb19b5224dbb3587a0dcfe7d8bfdb7ec19a3412d90b78 -address /run/containerd/containerd.sock │ │ ├─14303 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 053507f611c0e206ffde597cf7b702cb9bd32328a4495fb6ee81808f6a496343 -address /run/containerd/containerd.sock │ │ ├─14909 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5769dec42234c32052e7d8959316eb272a95ba4cfaa1147fc6494098ea46cef6 -address /run/containerd/containerd.sock │ │ ├─18343 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id da2c372416b41c8529d4bb1af2b06ee657d9e58ba1a17bf2c8d9e347b20b6cd1 -address /run/containerd/containerd.sock │ │ ├─20959 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bfe84876a68f7b595412c56e6998fde8a1004b83139b7256114df63e76e1d139 -address /run/containerd/containerd.sock │ │ ├─21040 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ad4d626b35ed6c7fc10dc6ad75d44ef49d3effac0ea84991931e1ccb84db00ec -address /run/containerd/containerd.sock │ │ ├─21051 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 87f7515956c93cc541edceb9d6de4492aad3099c9c16f7ae99530bedf0c2e369 -address /run/containerd/containerd.sock │ │ ├─21128 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 05f58760905f455375acd5cb9212e9b66fde740a2e7b6915ed5ba6f20a2093f0 -address /run/containerd/containerd.sock │ │ ├─22091 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7f45a2ac3e0de9a34da17c4513a0526b237c6bfa930e9e24cea907d77436f209 -address /run/containerd/containerd.sock │ │ ├─22330 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 629173c792e15dca5c0625b9ad143f46dce27f4a18858f15eb9f8e63db704105 -address /run/containerd/containerd.sock │ │ ├─23464 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0e7028516c80f6fc84709e061e861b0c37014aa3c154d69f18a8d69afe004da2 -address /run/containerd/containerd.sock │ │ ├─24666 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f0adf37a7e6531b74c0e4e8d733bcc55c76adf1c895195aa2d12c6d0477aed82 -address /run/containerd/containerd.sock │ │ ├─30173 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dde7a119a158624bb435d77f6c3d7a674ef28fba786bccf5bdd26b54b75c88bf -address /run/containerd/containerd.sock │ │ ├─30222 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aa775cbb7c3e03cfd78f0ff0ab2967d4e851f10c9285dd9f818eeb22fe66671a -address /run/containerd/containerd.sock │ │ └─30255 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 982ed6a03f12122389b0e08bb20f2761e13089cbe4e827adbfef668abb3f95e9 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1092 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─330 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─539 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─557 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─533 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4893 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.212 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─298 /lib/systemd/systemd-journald │ ├─ssh.service │ │ ├─ 563 sshd: /usr/sbin/sshd -D [listener] 1 of 10-100 startups │ │ ├─38753 sshd: root [priv] │ │ └─38754 sshd: root [net] │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1295 /usr/sbin/uuidd --socket-activation │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─538 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─395cc5de3b68ad4d9e243902c4be76cad737c354e3dbfc05b53b1c648b7d2723 │ │ └─11789 /pause │ ├─bfbdb76ceadf99eaed977c0951c5b8da60868514cd27b60b34c603b3007035e4 │ │ └─4744 kube-apiserver --advertise-address=199.19.213.212 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─7519a1b4a68f87c7e1a7c33906e7b75b67ca49ab101722889d3899d523f0921b │ │ └─10701 /pause │ ├─8bdc5bdb566a7d9c0d1919a66054dc5970c3873e0c16b17842498451b9fb1565 │ │ └─14753 /bin/memcached_exporter │ ├─4dc9f95a81061bc6502cd3f56050c4213ccaabcea0001ea5e280ff0950927e6b │ │ └─4563 /pause │ ├─a9a360ded223f85513a124e9d643cc9da009e098af132dcc41eaa8e7359665f7 │ │ └─7462 /pause │ ├─05f58760905f455375acd5cb9212e9b66fde740a2e7b6915ed5ba6f20a2093f0 │ │ └─21152 /pause │ ├─3c325eda108b58e216f367f43b315ff1cab20583fbb82a44de73c17ffcf51dc7 │ │ └─8640 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─0aef2c27180b0ed19cee9ffccf45bce46e503412081a3043faf723351c8da7e4 │ │ └─4700 etcd --advertise-client-urls=https://199.19.213.212:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.212:2380 --initial-cluster=instance=https://199.19.213.212:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.212:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.212:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─1fcfd8e2ba9d31cc5c09307ad8ca8d343c2f3078cb8771d5653c7a8244374b4b │ │ └─21727 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─f3b47031d89e92cf154582eedfcd3d5900e608cc899bc0eb62e0519f38345392 │ │ └─4758 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─387777400c4e27bb0d3baca1a435ec70e16ff2ba8882cd99577fb897b4e9601a │ │ └─7552 /coredns -conf /etc/coredns/Corefile │ ├─768ce5d48a22d6a94f8df04b18f1937d129343b0c68193c119e472e3f1b70aac │ │ └─8562 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─4d96f3203cc4735644e61882ff887823084bf9315d029c1a0f6e0a943d482241 │ │ ├─26971 apache2 -DFOREGROUND │ │ ├─26985 (wsgi:k -DFOREGROUND │ │ ├─26986 (wsgi:k -DFOREGROUND │ │ ├─26987 (wsgi:k -DFOREGROUND │ │ ├─26988 (wsgi:k -DFOREGROUND │ │ ├─26990 apache2 -DFOREGROUND │ │ ├─26992 apache2 -DFOREGROUND │ │ ├─26996 apache2 -DFOREGROUND │ │ ├─26997 apache2 -DFOREGROUND │ │ ├─26998 apache2 -DFOREGROUND │ │ ├─26999 apache2 -DFOREGROUND │ │ ├─27001 apache2 -DFOREGROUND │ │ ├─27002 apache2 -DFOREGROUND │ │ ├─27003 apache2 -DFOREGROUND │ │ └─27004 apache2 -DFOREGROUND │ ├─827edfd1fdcf9655baf502530e4f9b26a5acf5ecb590dfe85e28a5228cc17915 │ │ └─23245 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-212.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─da2c372416b41c8529d4bb1af2b06ee657d9e58ba1a17bf2c8d9e347b20b6cd1 │ │ └─18366 /pause │ ├─aeac86b4ea77604eff51cfec0c3579bac42a99b593afd2979b5dbc8ef61fd1cb │ │ └─4611 /pause │ ├─afdb80cf1d809fe282838d2dd6159afbdd6160624004444a977196c015162d32 │ │ └─22670 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─68ab6d0019a3c7c8b2c2eb5856f31f643728021dd3f2954c65d86a913a109013 │ │ └─5719 /pause │ ├─9e7e649136a1422288e7cbdaa2ea44ad1c3808a9420cd2a885faa2f924aebda7 │ │ └─8458 /pause │ ├─c79aa12005a1252e7d6ff8f65791788e6d5830b7b6b10af8f7f552c097bd3feb │ │ └─11538 /manager --metrics-bind-address=:9782 │ ├─053507f611c0e206ffde597cf7b702cb9bd32328a4495fb6ee81808f6a496343 │ │ └─14330 /pause │ ├─ea79d387ffbef086948fcbcf915246d853cb7099861ab2f85b5a54e6fb32be33 │ │ └─4844 /kube-vip manager │ ├─27d8107a44dcbcb62132cf332d35e67e713111fe2181a7d688715c3800cdd064 │ │ └─14707 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─d3f836b0780ebab8d81a7336232f88edeff5c324162f50a80808fda6d60b2e04 │ │ └─7126 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─90ce5a4103f3955632b23f46628fa5feb47981e2afb7653fc0bd296001c2c27a │ │ └─5037 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─c389d8e38ad4ff1c540976b4debfd48fb249ed278a64c2ca5f37c443d6e7a75f │ │ └─12529 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─12a68f95b7f8830894132acf98fc391067a71f01249d643c86e4426dddc15d1e │ │ └─4607 /pause │ ├─bfe84876a68f7b595412c56e6998fde8a1004b83139b7256114df63e76e1d139 │ │ └─20995 /pause │ ├─d0b2faec134ee8cadeabde2e7a74b3b8a8bb72113558ee1bce674f9d2a24033a │ │ ├─21898 python -u /app/sidecar.py │ │ ├─22179 python -u /app/sidecar.py │ │ └─22180 python -u /app/sidecar.py │ ├─65451ea0fa4e939cf73ee1a541d643e11bd00e3503dafc7b0acf33668e1bad43 │ │ └─7537 /coredns -conf /etc/coredns/Corefile │ ├─943f9b073daa796eeb3b550fb0f209bfe8df12ed09c0b659fb2dc065cafce884 │ │ └─18484 /secretgen-controller │ ├─51cb999eca067cff30f4da347f92f9064ffac58d494776a3beb6d0a373900e6f │ │ └─12059 /pause │ ├─ad4d626b35ed6c7fc10dc6ad75d44ef49d3effac0ea84991931e1ccb84db00ec │ │ └─21091 /pause │ ├─dc1aac1d3e59b9e1cd0f429cacb6e150c7ec4e98f3037765ce9ad67eaae34086 │ │ ├─31824 apache2 -DFOREGROUND │ │ ├─33842 (wsgi:h -DFOREGROUND │ │ ├─33843 (wsgi:h -DFOREGROUND │ │ ├─33844 (wsgi:h -DFOREGROUND │ │ ├─33845 (wsgi:h -DFOREGROUND │ │ ├─33846 (wsgi:h -DFOREGROUND │ │ ├─33847 apache2 -DFOREGROUND │ │ └─33848 apache2 -DFOREGROUND │ ├─4ab97c1e29ccf5d9961484cebf6417e8e6f5a50ee6a40b1bb6a2a3cd9c837821 │ │ ├─12760 mysqld --wsrep_start_position=f0fbfb35-3d69-11f1-9f9d-6e04f9e81526:20 │ │ └─12853 /var/lib/mysql/mysql-state-monitor │ ├─629173c792e15dca5c0625b9ad143f46dce27f4a18858f15eb9f8e63db704105 │ │ └─22355 /pause │ ├─92a2b57881e48bc39ef70ea5dec92fad9b39b262a68db83ebbeb072c4c7abd89 │ │ └─4610 /pause │ ├─cd546f32f7e335fed92fb5277b9d7890c0680a87672cddcf241d77b2669db7b7 │ │ └─23319 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─3ce0e5bad6d553fe5a7bfb794f61647e3305ae2e6be04059ef1009bc90dbb46b │ │ └─11397 /pause │ ├─10cac09eb57ee5917f71686012143367410fe5c8a5e60eb6c65e90fbe2cb52ac │ │ └─10809 /pause │ ├─88e715e5bddb804ba8d02ef3b3d984cb0d121d695950e97251256a9dc9faf98a │ │ ├─12457 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13931 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─d7a2ed4d813db16f4ccf97a65afe067bcb1e5189ab423f11f53cad52f7c60525 │ │ ├─6378 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6701 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─7f45a2ac3e0de9a34da17c4513a0526b237c6bfa930e9e24cea907d77436f209 │ │ └─22115 /pause │ ├─0a994d15d05ab09fabd4e9fd95059f358b9af2c340120f685caeb5c9e61c4a91 │ │ └─5012 /pause │ ├─21331dd7499d8a40ef146175fd1364289aecc0d96db22c7fad63e02930745467 │ │ └─11912 percona-xtradb-cluster-operator │ ├─b0d33bfbac3a917a65b9ef041395d32dcca990daedcc5006a594db7d83af4326 │ │ └─7099 /pause │ ├─f8e650441de8f6c3673a6b4d7af995dcc51c48509ef70d3deb5002e4ef44397e │ │ └─7995 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─29f2cb60eeff24139415375822d052d194127c0b0dc8be812a45637230b06108 │ │ └─22198 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─075b239557c1221a5be0a9d04d305b7006bc10bd8fd55118d13597d276dbbd9a │ │ └─12952 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─76acbf95633d98150b0b94a11d2fdcd02b0cbfb286a80fe4db4fe6bd65ba3b46 │ │ └─21350 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─982ed6a03f12122389b0e08bb20f2761e13089cbe4e827adbfef668abb3f95e9 │ │ └─30302 /pause │ ├─5077418d8c38e7fbb718638ea29e81aed0a80da2eb103f7127bd1ad70bb20cb2 │ │ ├─11012 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─11029 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─11137 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─31356 nginx: worker process │ │ ├─31357 nginx: worker process │ │ └─31358 nginx: cache manager process │ ├─93585732b641584b22f15415b5141b5eed672ca5165b33eba046b05028908a0f │ │ └─23149 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─8ac8969cd277215f4294c549dfb17c7312dfa2dc06560656f0ab234dbf9d186c │ │ └─11071 /server │ ├─87f7515956c93cc541edceb9d6de4492aad3099c9c16f7ae99530bedf0c2e369 │ │ └─21102 /pause │ ├─87921cb7e585bb1defb9345cb58637c99ab45bf3e8ebaa03f1241df796e74e78 │ │ └─5793 /pause │ ├─15cf16cec696a9538fa15faab64c4aea682a5afca1b9170b260af6d66075ab71 │ │ └─23396 /bin/oauth2-proxy │ ├─bf18f029ef85e27b309d4ac2510478f9f88121dbc45c75308f757b4544989124 │ │ └─7873 /pause │ ├─5769dec42234c32052e7d8959316eb272a95ba4cfaa1147fc6494098ea46cef6 │ │ └─14934 /pause │ ├─4bc9fb82102190972f3bb19b5224dbb3587a0dcfe7d8bfdb7ec19a3412d90b78 │ │ └─12433 /pause │ ├─dde7a119a158624bb435d77f6c3d7a674ef28fba786bccf5bdd26b54b75c88bf │ │ └─30198 /pause │ ├─f4eba34e330ff4e8ce253a402e802306f9c45ef5af49202b8c96f5c7ffb84eb1 │ │ └─8602 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─b31adad0b863c23c1d7d21709d6041b664c977917e9daaf4b81690f5353b40d1 │ │ ├─31806 apache2 -DFOREGROUND │ │ ├─33755 (wsgi:h -DFOREGROUND │ │ ├─33756 (wsgi:h -DFOREGROUND │ │ ├─33757 (wsgi:h -DFOREGROUND │ │ ├─33758 (wsgi:h -DFOREGROUND │ │ ├─33759 (wsgi:h -DFOREGROUND │ │ ├─33760 apache2 -DFOREGROUND │ │ └─33761 apache2 -DFOREGROUND │ ├─c4af4adc8767b2a4c6e41b57890afaca918c9f66a9291114543da2202c056cca │ │ ├─21936 python -u /app/sidecar.py │ │ ├─22182 python -u /app/sidecar.py │ │ └─22183 python -u /app/sidecar.py │ ├─c47eedaf49837510f99f444a73a79e147624bca4ccd8813bdb1475c606038b80 │ │ ├─23730 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23747 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─23753 erl_child_setup 1048576 │ │ ├─23795 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23796 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23806 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─23843 /bin/sh -s rabbit_disk_monitor │ ├─1e642f866582fbfbba184f40ada2eb685aeaedb1e66eff80f78be7b756258d4c │ │ └─4741 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─9629a515848f735ec8dcaa7f4c2ec6bac0b92ea6adcf4f4100b771b50ea5a705 │ │ └─23278 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─aa775cbb7c3e03cfd78f0ff0ab2967d4e851f10c9285dd9f818eeb22fe66671a │ │ └─30250 /pause │ ├─bc5bb716bfb32679fc66d3752993c41f8b5bb03bb0ae728afa800db9e73140c3 │ │ └─6175 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─09c46591d31107eaa3951dfbb31d441a3abcaeda3bc3da9b48c19b5e62eb28a4 │ │ └─23105 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-212.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─84009257d1c525e30c45f615e2353a1ffdf05224f9b6935c05c352e00eebf8ca │ │ └─23154 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─d820a5152ae6d16f29fa4a62f17f42c6f33ec80c7eb8a58fb593a63fba5cfb7e │ │ └─8412 /pause │ ├─71c72a9a6c9415c747c931bea41e424e2c8da6b1a1e03906d4a1ab552c92534b │ │ └─4634 /pause │ ├─0e7028516c80f6fc84709e061e861b0c37014aa3c154d69f18a8d69afe004da2 │ │ └─23489 /pause │ ├─9b4db848fd6613d578ac76723beeb678a5c62718e8907732d42d879f43c727fe │ │ └─23376 /bin/oauth2-proxy │ ├─a31ab11140c2096d2267617ecc21ead4dafb61388f5ddd47dfeb9f4abf8f9610 │ │ ├─31518 apache2 -DFOREGROUND │ │ ├─33579 (wsgi:h -DFOREGROUND │ │ ├─33580 (wsgi:h -DFOREGROUND │ │ ├─33581 (wsgi:h -DFOREGROUND │ │ ├─33582 (wsgi:h -DFOREGROUND │ │ ├─33583 (wsgi:h -DFOREGROUND │ │ ├─33584 apache2 -DFOREGROUND │ │ └─33585 apache2 -DFOREGROUND │ ├─d4699b8862524003305e0ffa60b95170c692decfd03a9bec9faeaa2d0d8f1db0 │ │ └─7501 /pause │ ├─adfb201d5b979065878809ed93191232c84bf9082cff69ad93c47d86e935ff56 │ │ └─15015 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─9d1e66be7c4b69cb752c6fb416e5f6d0acd729e6653b73a02c189da577e1a932 │ │ └─11488 /pause │ ├─d1c98db8bc171b741815e8c06237e4bfd86f3ece44de5d64ea639312d9c3bfa9 │ │ └─8494 /pause │ ├─f0adf37a7e6531b74c0e4e8d733bcc55c76adf1c895195aa2d12c6d0477aed82 │ │ └─24690 /pause │ └─50d3366505ccf01be104a3ee721aa85b9a348c08e1d6bc74a1082f8a6470145b │ └─11637 /manager --metrics-bind-address=:8080 ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount