Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─614 /lib/systemd/systemd --user │ │ └─615 (sd-pam) │ ├─session-4.scope │ │ ├─1350 sshd: zuul [priv] │ │ └─1363 sshd: zuul@notty │ └─session-1.scope │ ├─ 611 sshd: zuul [priv] │ ├─ 629 sshd: zuul@notty │ ├─ 766 /usr/bin/python3 │ ├─ 1354 ssh: /home/zuul/.ansible/cp/199.204.45.95-22-zuul [mux] │ ├─21809 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-cyzmzufydwpakfcbdkoyqaomnibtzrlv ; /usr/bin/python3'"'"' && sleep 0' │ ├─21810 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-cyzmzufydwpakfcbdkoyqaomnibtzrlv ; /usr/bin/python3' && sleep 0 │ ├─21811 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-cyzmzufydwpakfcbdkoyqaomnibtzrlv ; /usr/bin/python3 │ ├─21812 /bin/sh -c echo BECOME-SUCCESS-cyzmzufydwpakfcbdkoyqaomnibtzrlv ; /usr/bin/python3 │ ├─21813 /usr/bin/python3 │ ├─21814 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─21816 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2871 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4426 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 95517ae4f3af56ed7845271e84c55b902bfc99e70b5f82412556baeb8bcdd7fc -address /run/containerd/containerd.sock │ │ ├─ 4456 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 08b292c4d9f48adbc658a360274cceaaf5101fdd6acbe96f48fc31a4f0caf802 -address /run/containerd/containerd.sock │ │ ├─ 4467 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8c1c44a625f595f266b724b7d7428d39b6fd588728833eb8e6761cb2f41cafaf -address /run/containerd/containerd.sock │ │ ├─ 4479 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 927a3ff2f2e36eb3729290c752748ab5c5de6acdf7aa51366a62f3693e077b24 -address /run/containerd/containerd.sock │ │ ├─ 4482 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 70b747b55e0a4255d444995174d48d5d1e86413d77203ba7fe038bab072c5090 -address /run/containerd/containerd.sock │ │ ├─ 4996 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 133616c99ddb620eeabe6d2318cefb033dbc5dfbff5f8a6e8441eda877a1927c -address /run/containerd/containerd.sock │ │ ├─ 5650 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 09e16a76a2d6d666a8c0d17f4402d55763f65ab9be9a83d9557d6be00dd08b5f -address /run/containerd/containerd.sock │ │ ├─ 5693 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9457c92910f3fc9784f48c5831b0728a1b9ad54c839510803ea3ac2e351ddad4 -address /run/containerd/containerd.sock │ │ ├─ 6843 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 20b736373a8d5baea198991e8d3802efb02f59e1c660f109dc5ebe72782d74bd -address /run/containerd/containerd.sock │ │ ├─ 7188 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 61327a1b32dde86cb57a86eea62dcf31272b89c8469f97b97133a88796889cfa -address /run/containerd/containerd.sock │ │ ├─ 7234 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e3f44d5cf7241eca1c1873ce6976bcf1e7b5886dceaa4a5bcea577560f661fa3 -address /run/containerd/containerd.sock │ │ ├─ 7577 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3f55dab79829d279474dcac06b31bc1a8221536e52f91cf945d87d175aea6479 -address /run/containerd/containerd.sock │ │ ├─ 8034 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2390671c7469ba4ed6a3b60345437d4535fdfe1436fa4728f5a00c49c65f9f40 -address /run/containerd/containerd.sock │ │ ├─ 8082 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 50c56e0369cbb39dfc8529d61e15976448c3c1d0b2b29116ba775d3b45e196b4 -address /run/containerd/containerd.sock │ │ ├─ 8098 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b8c5b1e5a57d7ffc82f665896ad1939e4049ddd51e3cc5d349f54647b8643ca3 -address /run/containerd/containerd.sock │ │ ├─10325 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aee1ddf9a7c51781d97c02bc2decf35fd60163899e5bbaa8fbdfb77e55b0412e -address /run/containerd/containerd.sock │ │ ├─10399 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3a22a2c6ad3d83a1efa015d8cce367c5b6c3c2a8ac92ba31c014f49c66e57583 -address /run/containerd/containerd.sock │ │ ├─11016 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b239aff6f209bf9f0f7d206b9549bf1216b051e94aca0b40e03811ea875864d7 -address /run/containerd/containerd.sock │ │ ├─11109 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 058d12eaf97db6ecd1b63263508ff37388186a713f8d04b16fc422239291e66c -address /run/containerd/containerd.sock │ │ ├─11402 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 85ced066f928c55f4cf1869bdc8dfbb97c981b0183a187816a5ebd5e7a128fde -address /run/containerd/containerd.sock │ │ ├─11796 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 61ac7aef68da3e1cdd1a8a6b805026bfb316083857ae19a92f8dc6926f5210b0 -address /run/containerd/containerd.sock │ │ ├─12191 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c9d6f80473dca7dbd8ad0332259e134372bdce3d1ee3999bae02db4ec3afa576 -address /run/containerd/containerd.sock │ │ ├─13783 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 26576994312db610deb80ec0dd5d91eb0c05c13dcf3af29741f1902b01409652 -address /run/containerd/containerd.sock │ │ ├─14396 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ff52bb000562beed2e7fc77dcfea39f744adea1169c9143f38ff512df84eb3a9 -address /run/containerd/containerd.sock │ │ ├─17851 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 13a0323e3922f50348bbaaab20f70e1bdbc9b15e6d150def8061bde8b7ac59e7 -address /run/containerd/containerd.sock │ │ ├─20279 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b917eb6f6c1ad75429576b84453157f2a0a9b5e7eec4606e8586df28c333e2fb -address /run/containerd/containerd.sock │ │ ├─20430 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 465173e29ce9a52f68be943740631746d0f416ac5be79e1c576975d647ce0423 -address /run/containerd/containerd.sock │ │ ├─20474 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5fa0415a5afab4c589ca7dada8fc01b8d351f00cd71e0e8a5351630296aefc35 -address /run/containerd/containerd.sock │ │ ├─20511 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2bcb96aada7c6437ac6b54e50cca4638634b92bb65674da09bc0fb0d12723ea6 -address /run/containerd/containerd.sock │ │ ├─21671 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 33b05b8f9f3c149535d55476256716c1c50fe032debfe6dcfde5214814b25917 -address /run/containerd/containerd.sock │ │ └─21708 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6bfa1e6b698df9419371139e59f0a77f74d15caa47210bf15d3b287c34dbf7a6 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1090 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─439 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─329 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─542 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─555 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─533 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4859 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.95 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─561 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1283 /usr/sbin/uuidd --socket-activation │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─530 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─539 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─536 /lib/systemd/systemd-logind ├─k8s.io │ ├─92eed634099b23d74e2fc15d90692805d91825eb8b6bbb4c561e40ac9f08ea99 │ │ ├─12242 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13436 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─7cbbbd51292a085e2b81abd217180a7895f7dc81525163caa7e9a25aa07de9dc │ │ ├─10624 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10636 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10762 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─20801 nginx: worker process │ │ ├─20802 nginx: worker process │ │ └─20803 nginx: cache manager process │ ├─3aa5256e8f79a2fb93c9f5ebc7ee9e70a3fb7155a1ccbac1be7d33652cae3e52 │ │ └─11180 /manager --metrics-bind-address=:9782 │ ├─b8c5b1e5a57d7ffc82f665896ad1939e4049ddd51e3cc5d349f54647b8643ca3 │ │ └─8140 /pause │ ├─70b747b55e0a4255d444995174d48d5d1e86413d77203ba7fe038bab072c5090 │ │ └─4584 /pause │ ├─8722439916abfb43e6c68d4d6d1eb7ecf6ac3074986e2042a8e678700e935d48 │ │ └─8247 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─dbbf170f770e5b6dc6b9739789b5a2f56cd1223e7392d96accb96c495f629485 │ │ └─21327 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─22b54c897e5852bfc5ad4dd39408a99ce90d640624fd5bea84eec181bd564d3b │ │ └─11561 percona-xtradb-cluster-operator │ ├─13a0323e3922f50348bbaaab20f70e1bdbc9b15e6d150def8061bde8b7ac59e7 │ │ └─17877 /pause │ ├─20b736373a8d5baea198991e8d3802efb02f59e1c660f109dc5ebe72782d74bd │ │ └─6864 /pause │ ├─61327a1b32dde86cb57a86eea62dcf31272b89c8469f97b97133a88796889cfa │ │ └─7211 /pause │ ├─d265e9d24e604af643f39149b1939d46db4f6aa9af982a63e9805ea67f51ccd6 │ │ └─8327 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─927a3ff2f2e36eb3729290c752748ab5c5de6acdf7aa51366a62f3693e077b24 │ │ └─4593 /pause │ ├─0edf6038c99319ba406909d00baf798727f9edc4fbf2f62104c9265f539c6d22 │ │ └─6900 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─133616c99ddb620eeabe6d2318cefb033dbc5dfbff5f8a6e8441eda877a1927c │ │ └─5021 /pause │ ├─c8d014942277065acd7cbbd75e770095fcf358dc36c32801f8d76f9694cd7e43 │ │ └─5918 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─c11be84507d12355a3b95ed80453d9938ff6507a75a18fdbddcd445d38fdaa3e │ │ ├─21183 python -u /app/sidecar.py │ │ ├─21477 python -u /app/sidecar.py │ │ └─21478 python -u /app/sidecar.py │ ├─058d12eaf97db6ecd1b63263508ff37388186a713f8d04b16fc422239291e66c │ │ └─11133 /pause │ ├─2c67f2935787c6b6356ee0d0037b33f64f2d0ba9b0b7883e5ebb6f10108e220b │ │ └─5049 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─0579d5d0b96d05f91356776c1b4a7e13874d73fed2f849e5ccbc76cfa2767fcb │ │ └─7274 /coredns -conf /etc/coredns/Corefile │ ├─95517ae4f3af56ed7845271e84c55b902bfc99e70b5f82412556baeb8bcdd7fc │ │ └─4533 /pause │ ├─09e16a76a2d6d666a8c0d17f4402d55763f65ab9be9a83d9557d6be00dd08b5f │ │ └─5683 /pause │ ├─3f55dab79829d279474dcac06b31bc1a8221536e52f91cf945d87d175aea6479 │ │ └─7601 /pause │ ├─08b292c4d9f48adbc658a360274cceaaf5101fdd6acbe96f48fc31a4f0caf802 │ │ └─4587 /pause │ ├─9591671c8f0ba5f6dc4aa1aad1967c2d8363500bbb1e365507ee463b9eb42700 │ │ └─4684 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─9ce165dee4112e9f37c5973a633aaf609df4d2afbd1e7d8b1acd8ec6674bcd49 │ │ ├─6120 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6455 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─b678ab9f9b7781c5aff4587cbce87e12dbe168007a65bd59351183874ccc0961 │ │ └─4709 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─82aeb08772cd27bed8f08494d2934c849c00827f985528b80966734a8357ed41 │ │ └─14202 /bin/memcached_exporter │ ├─2bcb96aada7c6437ac6b54e50cca4638634b92bb65674da09bc0fb0d12723ea6 │ │ └─20538 /pause │ ├─9457c92910f3fc9784f48c5831b0728a1b9ad54c839510803ea3ac2e351ddad4 │ │ └─5716 /pause │ ├─f5615d5d86671914829b057caa1b170ab000e5c62b20f353190beb0ecacaa95e │ │ └─10668 /server │ ├─5fa0415a5afab4c589ca7dada8fc01b8d351f00cd71e0e8a5351630296aefc35 │ │ └─20496 /pause │ ├─ffd3cb7a30d76df94f03d8569fa2d875a3a1484db1c9751251c71112e304e4ff │ │ └─12480 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─3a22a2c6ad3d83a1efa015d8cce367c5b6c3c2a8ac92ba31c014f49c66e57583 │ │ └─10423 /pause │ ├─85ced066f928c55f4cf1869bdc8dfbb97c981b0183a187816a5ebd5e7a128fde │ │ └─11427 /pause │ ├─50c56e0369cbb39dfc8529d61e15976448c3c1d0b2b29116ba775d3b45e196b4 │ │ └─8136 /pause │ ├─8c1c44a625f595f266b724b7d7428d39b6fd588728833eb8e6761cb2f41cafaf │ │ └─4563 /pause │ ├─879f69daee74c5f846a643e2acedd42b333ccae9ee613682f52f360cb2137850 │ │ ├─21208 python -u /app/sidecar.py │ │ ├─21479 python -u /app/sidecar.py │ │ └─21480 python -u /app/sidecar.py │ ├─465173e29ce9a52f68be943740631746d0f416ac5be79e1c576975d647ce0423 │ │ └─20453 /pause │ ├─aee1ddf9a7c51781d97c02bc2decf35fd60163899e5bbaa8fbdfb77e55b0412e │ │ └─10349 /pause │ ├─cb601d85bdb51859ce28ae75e00c10c5e0d5bcd82cac0b1e2ba22ce5debcea36 │ │ └─4810 /kube-vip manager │ ├─cbfaad610a1b1ebce3cf883131d3904581089a35f9697af5dc9463cacb417900 │ │ └─14503 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─33b05b8f9f3c149535d55476256716c1c50fe032debfe6dcfde5214814b25917 │ │ └─21695 /pause │ ├─17f87fe7c9d75f7bad2549ddbea2a61a3fe7f8ab597d05d8d664f35c453fdac7 │ │ └─11297 /manager --metrics-bind-address=:8080 │ ├─61ac7aef68da3e1cdd1a8a6b805026bfb316083857ae19a92f8dc6926f5210b0 │ │ └─11823 /pause │ ├─e3f44d5cf7241eca1c1873ce6976bcf1e7b5886dceaa4a5bcea577560f661fa3 │ │ └─7257 /pause │ ├─2d5bf12f0076da01914a5d907f57c16fe42a1dfc0cd430c03e6ba93e92b7430b │ │ └─4721 kube-apiserver --advertise-address=199.204.45.95 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─393e40a17a14986995aef77d2b46747222e6d5dd382e358b7556db847c694306 │ │ ├─12384 mysqld --wsrep_start_position=d43263a9-31fb-11f1-aa48-5f4bb6e3d6f3:20 │ │ └─12505 /var/lib/mysql/mysql-state-monitor │ ├─fa6a89067cdde7f9b73849dbe6c70e94cb1b5ad42c1a88cde52f7e85821a8c2e │ │ └─12349 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─f4f6b9dead690e0ff2c064071b6e7faf94497c672c10d72b43384f0048ae83a4 │ │ └─21518 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─ff52bb000562beed2e7fc77dcfea39f744adea1169c9143f38ff512df84eb3a9 │ │ └─14420 /pause │ ├─e08e087f83acaa7645159c888f6334553ecfd3d9afc6eace90d5fce3d81f9a96 │ │ └─8365 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─6bfa1e6b698df9419371139e59f0a77f74d15caa47210bf15d3b287c34dbf7a6 │ │ └─21738 /pause │ ├─1ae956598f7b5643f45c1e2e314df8dcd14d0a76176cfeead189d331ff432856 │ │ └─8287 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─55766ca47720cc8769c7b55a80bd4303324a478ebedc74d9ca2bcbc3dbd81999 │ │ └─17915 /secretgen-controller │ ├─26576994312db610deb80ec0dd5d91eb0c05c13dcf3af29741f1902b01409652 │ │ └─13806 /pause │ ├─b239aff6f209bf9f0f7d206b9549bf1216b051e94aca0b40e03811ea875864d7 │ │ └─11040 /pause │ ├─0007deab010623365c381d088fc67e341f91f88056eb4d1972dd24687c99e11f │ │ └─7317 /coredns -conf /etc/coredns/Corefile │ ├─b332b0ad98511824f60ae0f9d2837ac91b1e363ec4674704e2def00fe3fce1a2 │ │ └─20751 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─b917eb6f6c1ad75429576b84453157f2a0a9b5e7eec4606e8586df28c333e2fb │ │ └─20315 /pause │ ├─90b5f17bcc224f12b9c12f9753c1ff5bc67a882b31cfd376b343173558fdb960 │ │ └─14155 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─c9d6f80473dca7dbd8ad0332259e134372bdce3d1ee3999bae02db4ec3afa576 │ │ └─12212 /pause │ ├─22184d243a9ee1adc93a6fbb74e714a344c9f09f0780031be9c743f18bb9fcd4 │ │ └─4670 etcd --advertise-client-urls=https://199.204.45.95:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.95:2380 --initial-cluster=instance=https://199.204.45.95:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.95:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.95:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ └─2390671c7469ba4ed6a3b60345437d4535fdfe1436fa4728f5a00c49c65f9f40 │ └─8060 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount