Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-4.scope │ │ ├─1363 sshd: zuul [priv] │ │ └─1376 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 633 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1367 ssh: /home/zuul/.ansible/cp/199.204.45.244-22-zuul [mux] │ ├─38770 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-ehltvapzhzsonwzowxqzvxrniffltbmz ; /usr/bin/python3'"'"' && sleep 0' │ ├─38771 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-ehltvapzhzsonwzowxqzvxrniffltbmz ; /usr/bin/python3' && sleep 0 │ ├─38772 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-ehltvapzhzsonwzowxqzvxrniffltbmz ; /usr/bin/python3 │ ├─38773 /bin/sh -c echo BECOME-SUCCESS-ehltvapzhzsonwzowxqzvxrniffltbmz ; /usr/bin/python3 │ ├─38774 /usr/bin/python3 │ ├─38784 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38788 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2888 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4463 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fa360f96a8845c9edc2158df421b1d7123a2f626dbb892c137453b9db98aac02 -address /run/containerd/containerd.sock │ │ ├─ 4514 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 05fdb3bd9f5741adb7f26c0035ad9394fe31866f8a15f0b4d691538934f236de -address /run/containerd/containerd.sock │ │ ├─ 4517 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 611c43a3a824ff2bcc94fac74802d111f84bf69cf5938e1204fe440ddf300e00 -address /run/containerd/containerd.sock │ │ ├─ 4523 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2098157686a7b94c7a35f3a0f5991800f9d0f96abed46f088261455174fe236c -address /run/containerd/containerd.sock │ │ ├─ 4534 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 041b2d75690a0cd022828a0b532f57cf446efe3f4b0287d1d8f9a4ff83bdc133 -address /run/containerd/containerd.sock │ │ ├─ 5033 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id faf689e32fffa92aa42432face73f6eed42e8b1d431b7ea62fb4471264a8d6e6 -address /run/containerd/containerd.sock │ │ ├─ 5686 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b4761544ebe208a1caf3afbafe3c8a4e0c607db464dc7f67acdf003d9f4388b -address /run/containerd/containerd.sock │ │ ├─ 5712 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4ef75b161e9c239b1b72aa83b55dbd8174657949684671e01a8db1e0a369c398 -address /run/containerd/containerd.sock │ │ ├─ 6898 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d7490d1fcc045030cfdb65a0adb98ce0c44438d0a7437687891a62d8a3f978bd -address /run/containerd/containerd.sock │ │ ├─ 7244 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0e0650154e699cf0cefcbc5a6f64b7ceb4e7dd8980598631f78fa89648e2be12 -address /run/containerd/containerd.sock │ │ ├─ 7290 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2482bfa31cf11c5fbfca5588501e83b29f44c62c847ad90800d659a17512f6f0 -address /run/containerd/containerd.sock │ │ ├─ 7636 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c2c1aeb635c034d9b6d4472b4e32b0de946be85cb21405212e93b37e45e0cd2c -address /run/containerd/containerd.sock │ │ ├─ 8098 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e91fadf2b51131bacb5ced769c5b08a8328f004cea715d0263af06aaf70b8f98 -address /run/containerd/containerd.sock │ │ ├─ 8139 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 43932e0d83ba9c63074320122446511e9b1d07e95317becf21524b6200ba545a -address /run/containerd/containerd.sock │ │ ├─ 8164 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a20da4395e1971c52be2411a0609ac6ff5d22182354301cc74c15ca6b25333f0 -address /run/containerd/containerd.sock │ │ ├─10347 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d2f21987d46fc82dbb697ecb405fa9b4b1c80f5467b5b66c8a9a32a6b64e9c3c -address /run/containerd/containerd.sock │ │ ├─10444 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 03e2ac63ccabb4db04d0a176cd51f08d2862afe88d370ca758b7889f68bb2360 -address /run/containerd/containerd.sock │ │ ├─11067 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 46f436706af604ea0891d0a55f2915012248ec387a4a194266919b2f26c00e5f -address /run/containerd/containerd.sock │ │ ├─11162 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7cd5ea243bda51b707a1dd34e1bd4fbacb72bbcd6f9826d6c47b9e44bb50a217 -address /run/containerd/containerd.sock │ │ ├─11572 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bf30f59cc819f988df032058a65a7baa6dbe43adb1ae07d1cb994bac7933ebbb -address /run/containerd/containerd.sock │ │ ├─11898 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ebabe0708fe34dceccec83973395a4589f12cf4896a5229ccf75933fb730d7a1 -address /run/containerd/containerd.sock │ │ ├─12281 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2c10c299d5c351ecad08c760169e6654b089aa97748aa34cc720b81684a2faea -address /run/containerd/containerd.sock │ │ ├─13964 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f04045f9c3c2c200acb19d56e080ad5ec0ba722b9ab026b9fd3e0d4108414c91 -address /run/containerd/containerd.sock │ │ ├─14584 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2d07dd0da8f799d7b7fe79c5301de378fe16d5d0ae0c4736701835b51dee7862 -address /run/containerd/containerd.sock │ │ ├─18152 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 94b05d67c50d5b5755c91158985b136f66c79cf625f99e8b541c3dce78d8156b -address /run/containerd/containerd.sock │ │ ├─20653 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 05e3c7ffc6eece13a087a2cd2c93ea62fa9de042fb0294980318588fb22711df -address /run/containerd/containerd.sock │ │ ├─20750 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a979faf0c8d8f893a900762b895546daf8f82656240192e7ea1b9e60c70ad7db -address /run/containerd/containerd.sock │ │ ├─20836 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3ed649c96ee967a466a1bf7f1474c751df1e8de460303c1c5f134fa5fc0616bd -address /run/containerd/containerd.sock │ │ ├─20876 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0ea52f9a2bce7e1b01d2580713a7a3c349dbb0c3dd5157f5800b690cc29186b0 -address /run/containerd/containerd.sock │ │ ├─22067 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7d9216e95dedc41a0a4a1636e918aaa81dc5ea3163be247e1c57d2ce3b630cbf -address /run/containerd/containerd.sock │ │ ├─22146 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 15c7a3de35d723f3b9e9dc161a46fe13cdf8b51d3d59fb237e0cbd937993d58b -address /run/containerd/containerd.sock │ │ ├─22816 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2472f74e4d8c1db5c34df0d72d6a98ec77dd3d5993cce26f75e5e9f28ac1bc22 -address /run/containerd/containerd.sock │ │ ├─24568 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 02d306648e5a351e02b4eb3bba0a741c3132732841326e6b5f98924498f84767 -address /run/containerd/containerd.sock │ │ ├─30093 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 58bbea6b7da6e868ebc71aea792c096b7441f7af11feafe37b80fcd648423182 -address /run/containerd/containerd.sock │ │ ├─30139 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 176b186b2f17dbf81b76cffcbf62ceca10a81cd80a1c299ff90adcafe7a63ce4 -address /run/containerd/containerd.sock │ │ └─30177 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1b0d13e21eb4567be0f32162a7ed790b6dbb261b95d2f32b3860b94e33d447c1 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1098 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─438 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─328 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─561 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─534 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4897 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.244 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─294 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─566 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1296 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─331 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─530 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─332 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─541 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─536 /lib/systemd/systemd-logind ├─k8s.io │ ├─8fb9bcf74a7280ba42672d79a3545a437d39eab6b6ef38024e6b4ffa91f05812 │ │ ├─12443 mysqld --wsrep_start_position=9055e1e4-3a21-11f1-836c-e268be32bfab:20 │ │ └─12568 /var/lib/mysql/mysql-state-monitor │ ├─ba9ad7b0a82ceae1c3b307bdca9ef0b5c3b8d8b1cf9ef38f3f44b93e0cab9f5d │ │ └─22966 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─05e3c7ffc6eece13a087a2cd2c93ea62fa9de042fb0294980318588fb22711df │ │ └─20686 /pause │ ├─d7490d1fcc045030cfdb65a0adb98ce0c44438d0a7437687891a62d8a3f978bd │ │ └─6920 /pause │ ├─46f436706af604ea0891d0a55f2915012248ec387a4a194266919b2f26c00e5f │ │ └─11090 /pause │ ├─13717bbbe73d186c0c108ec7fda420be9fdbf96fed65573808b5f0d785662832 │ │ ├─31634 apache2 -DFOREGROUND │ │ ├─33564 (wsgi:h -DFOREGROUND │ │ ├─33565 (wsgi:h -DFOREGROUND │ │ ├─33566 (wsgi:h -DFOREGROUND │ │ ├─33567 (wsgi:h -DFOREGROUND │ │ ├─33568 (wsgi:h -DFOREGROUND │ │ ├─33569 apache2 -DFOREGROUND │ │ └─33570 apache2 -DFOREGROUND │ ├─1b0d13e21eb4567be0f32162a7ed790b6dbb261b95d2f32b3860b94e33d447c1 │ │ └─30202 /pause │ ├─05325d661aeaecedbb93462cc752aef717f455e3ee4b3b8c47f45e46426ad89a │ │ └─8394 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─ebabe0708fe34dceccec83973395a4589f12cf4896a5229ccf75933fb730d7a1 │ │ └─11922 /pause │ ├─89e04162eff46f81cbbf5f0a5983f66ce9e0879d260f032cc941228c177569d1 │ │ ├─23490 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23523 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─23529 erl_child_setup 1048576 │ │ ├─23574 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23575 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23585 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─23667 /bin/sh -s rabbit_disk_monitor │ ├─9d6de8c2a3b99af00be22e8566ce9bd9c0700e6d6f6c16639ac35b1495c98ed1 │ │ └─11331 /manager --metrics-bind-address=:8080 │ ├─ffc8dda6fd9b01320bb21392d5fb98d065d15cb5f87db8102ed1ebcc42c1e291 │ │ └─7375 /coredns -conf /etc/coredns/Corefile │ ├─3af5efe5ace43c455943129a708373abcdb827199aafc30ce9a84783c417ec3a │ │ └─21318 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─a1fedd170f4e8f528bf5d8235054a433be5d31f6bbcccf4c9f94e33004ebec36 │ │ └─11238 /manager --metrics-bind-address=:9782 │ ├─58bbea6b7da6e868ebc71aea792c096b7441f7af11feafe37b80fcd648423182 │ │ └─30115 /pause │ ├─56ebe93ff188a8dd1edcf0475a3d7a7f03f5a1e1516f05d73769c85c95451ef1 │ │ └─22919 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-244.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─2d07dd0da8f799d7b7fe79c5301de378fe16d5d0ae0c4736701835b51dee7862 │ │ └─14609 /pause │ ├─942b43662ca6854702480080f44ed5a4c17542410fcbd6b467f48eacbc7c2db4 │ │ └─14343 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─2482bfa31cf11c5fbfca5588501e83b29f44c62c847ad90800d659a17512f6f0 │ │ └─7313 /pause │ ├─07a52ec2d14ec194f3a1c6e785757dca57cba92d042d6f0db4c62fb7729a6104 │ │ ├─6161 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6528 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─f04045f9c3c2c200acb19d56e080ad5ec0ba722b9ab026b9fd3e0d4108414c91 │ │ └─13988 /pause │ ├─05fdb3bd9f5741adb7f26c0035ad9394fe31866f8a15f0b4d691538934f236de │ │ └─4631 /pause │ ├─43932e0d83ba9c63074320122446511e9b1d07e95317becf21524b6200ba545a │ │ └─8178 /pause │ ├─99d57bbf32c2de35c52c337665f9dcc5b78247e8a2eb31beb2b11bc78cd35295 │ │ └─6957 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─2944dcff83bf20958a087b24977337de597db68eee997179d766aac50a2fdec9 │ │ └─10721 /server │ ├─6f5800ad11a63a6aed62b8a26f6ebd5f63517432dd8b64eacdf60d0bfa27eed6 │ │ └─7332 /coredns -conf /etc/coredns/Corefile │ ├─c2c1aeb635c034d9b6d4472b4e32b0de946be85cb21405212e93b37e45e0cd2c │ │ └─7659 /pause │ ├─ab6b78e7841c292b5735293f0ee99c693327bf868724cdf80a7d5e2277f52fe8 │ │ └─23245 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─15c7a3de35d723f3b9e9dc161a46fe13cdf8b51d3d59fb237e0cbd937993d58b │ │ └─22171 /pause │ ├─02d0dbe5ebf947db3c784d966aeb618d79cb7cff683de88b9bfc120c0ace01c9 │ │ ├─12398 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─14954 haproxy -sf 180 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─d8342c0b29f65d14059ee48627d16484be670a34f65c9c82302a13659b62c674 │ │ └─23441 /bin/oauth2-proxy │ ├─ef557370e19314746c5c99d975c5b420e5b3b7125d440b0de7edcdef1849979d │ │ └─23509 /bin/oauth2-proxy │ ├─fa360f96a8845c9edc2158df421b1d7123a2f626dbb892c137453b9db98aac02 │ │ └─4511 /pause │ ├─dc0dd4d045273ed9c1443d5a81e6b0213be05f957458ba6c54045c5e77320580 │ │ └─12539 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─02d306648e5a351e02b4eb3bba0a741c3132732841326e6b5f98924498f84767 │ │ └─24600 /pause │ ├─8cb9e33dd6cc48d9426e109bd93bea7a0e84ee3ac047018983599b73cf062e2d │ │ └─5960 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─f443ebf5be6cfc4528e53218b754059cd0eb481368c1c79ca6209fa3a6e521b1 │ │ └─18225 /secretgen-controller │ ├─3f78c98a388a1c5a82807c239022448242e022a3cf05bc986ccb971addd602b4 │ │ └─23047 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-244.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─756658fdd876d8eac95e0ceba98f39f53badb17a6b1d87ceb70ef79bdd65adbf │ │ ├─31672 apache2 -DFOREGROUND │ │ ├─33716 (wsgi:h -DFOREGROUND │ │ ├─33717 (wsgi:h -DFOREGROUND │ │ ├─33718 (wsgi:h -DFOREGROUND │ │ ├─33719 (wsgi:h -DFOREGROUND │ │ ├─33720 (wsgi:h -DFOREGROUND │ │ ├─33721 apache2 -DFOREGROUND │ │ └─33722 apache2 -DFOREGROUND │ ├─2c10c299d5c351ecad08c760169e6654b089aa97748aa34cc720b81684a2faea │ │ └─12305 /pause │ ├─4ef75b161e9c239b1b72aa83b55dbd8174657949684671e01a8db1e0a369c398 │ │ └─5752 /pause │ ├─2472f74e4d8c1db5c34df0d72d6a98ec77dd3d5993cce26f75e5e9f28ac1bc22 │ │ └─22842 /pause │ ├─0e0650154e699cf0cefcbc5a6f64b7ceb4e7dd8980598631f78fa89648e2be12 │ │ └─7269 /pause │ ├─f7401e81cca7741eaa722cc9ade0020af847f563d1b350744b5842ff2e49c921 │ │ └─4755 etcd --advertise-client-urls=https://199.204.45.244:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.244:2380 --initial-cluster=instance=https://199.204.45.244:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.244:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.244:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─03e2ac63ccabb4db04d0a176cd51f08d2862afe88d370ca758b7889f68bb2360 │ │ └─10468 /pause │ ├─824babaa501db47afe391bfa8941f0645b232981b79a67fd5921b88339e6a210 │ │ └─5082 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─176b186b2f17dbf81b76cffcbf62ceca10a81cd80a1c299ff90adcafe7a63ce4 │ │ └─30163 /pause │ ├─913a2c7bc449c73ed5e4f287def97ca8dc6d9b14de3bab484048cd758985c5ca │ │ ├─21702 python -u /app/sidecar.py │ │ ├─21901 python -u /app/sidecar.py │ │ └─21902 python -u /app/sidecar.py │ ├─7d9216e95dedc41a0a4a1636e918aaa81dc5ea3163be247e1c57d2ce3b630cbf │ │ └─22091 /pause │ ├─04115f4caefb59d9b4b6f26901c66f2ed3e672f022f8c7d967498a474de6a3a4 │ │ └─14399 /bin/memcached_exporter │ ├─ad56667c3b314b166d1728d76cd8e88e37e9c18641ad60838f161193689617ec │ │ └─21922 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─2098157686a7b94c7a35f3a0f5991800f9d0f96abed46f088261455174fe236c │ │ └─4623 /pause │ ├─7b4761544ebe208a1caf3afbafe3c8a4e0c607db464dc7f67acdf003d9f4388b │ │ └─5722 /pause │ ├─52af8cc863ca5d30733ae47d90daafb82796f21b3ece90ac2c51068ed8615464 │ │ └─23085 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─47daaf23786a988c5b35f2c2a7447005a1aadfd24ea39104e864a0e4681ffde5 │ │ └─11788 percona-xtradb-cluster-operator │ ├─44809d451aaf732d2ec07fae678c8c6ace44d5121a78159181edb6aa5ea21ebb │ │ └─4715 kube-apiserver --advertise-address=199.204.45.244 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─bf30f59cc819f988df032058a65a7baa6dbe43adb1ae07d1cb994bac7933ebbb │ │ └─11606 /pause │ ├─a979faf0c8d8f893a900762b895546daf8f82656240192e7ea1b9e60c70ad7db │ │ └─20796 /pause │ ├─e91fadf2b51131bacb5ced769c5b08a8328f004cea715d0263af06aaf70b8f98 │ │ └─8123 /pause │ ├─462b67c45e65be4545837deefb93378341716a8818c74e5a2645c644a26a5416 │ │ ├─31647 apache2 -DFOREGROUND │ │ ├─33557 (wsgi:h -DFOREGROUND │ │ ├─33558 (wsgi:h -DFOREGROUND │ │ ├─33559 (wsgi:h -DFOREGROUND │ │ ├─33560 (wsgi:h -DFOREGROUND │ │ ├─33561 (wsgi:h -DFOREGROUND │ │ ├─33562 apache2 -DFOREGROUND │ │ └─33563 apache2 -DFOREGROUND │ ├─0ea52f9a2bce7e1b01d2580713a7a3c349dbb0c3dd5157f5800b690cc29186b0 │ │ └─20901 /pause │ ├─d801b6cf12cf9b22bf512b69df5b2f65b4e7c6e417f4b1e9008debab5917c723 │ │ └─4719 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─611c43a3a824ff2bcc94fac74802d111f84bf69cf5938e1204fe440ddf300e00 │ │ └─4632 /pause │ ├─cd52afaee980975453e644ae4256672b53c8074231b0a2eda0c5874dea1ab7be │ │ └─22494 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─0207b9295bcb3ab091106e3d77a4bccd4c4179e395682ddec8a4a822cf6a7dfe │ │ └─4853 /kube-vip manager │ ├─cf6f422d8df47d166d2baaae61f81585c5a44f62ddd29d241ad9e2c0377aa01b │ │ ├─21725 python -u /app/sidecar.py │ │ ├─21904 python -u /app/sidecar.py │ │ └─21905 python -u /app/sidecar.py │ ├─94b05d67c50d5b5755c91158985b136f66c79cf625f99e8b541c3dce78d8156b │ │ └─18176 /pause │ ├─faf689e32fffa92aa42432face73f6eed42e8b1d431b7ea62fb4471264a8d6e6 │ │ └─5057 /pause │ ├─ef8ddbfa188b9fb14d57efd49cdb51481e88c469f673e08b78cb5cc6f6b27f4e │ │ └─7708 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─7cd5ea243bda51b707a1dd34e1bd4fbacb72bbcd6f9826d6c47b9e44bb50a217 │ │ └─11185 /pause │ ├─a20da4395e1971c52be2411a0609ac6ff5d22182354301cc74c15ca6b25333f0 │ │ └─8203 /pause │ ├─3ed649c96ee967a466a1bf7f1474c751df1e8de460303c1c5f134fa5fc0616bd │ │ └─20861 /pause │ ├─49b3c383144355ff5ab46cc592d026cefbaaa3879471883101d459a8501da32f │ │ ├─10676 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10688 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10790 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─31313 nginx: worker process │ │ ├─31314 nginx: worker process │ │ └─31315 nginx: cache manager process │ ├─d2f21987d46fc82dbb697ecb405fa9b4b1c80f5467b5b66c8a9a32a6b64e9c3c │ │ └─10386 /pause │ ├─c4dca7e0bb77ccb4f776741bac915d5f44ded73ee40a2f1adb79e9df70ab6cc6 │ │ └─21175 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─041b2d75690a0cd022828a0b532f57cf446efe3f4b0287d1d8f9a4ff83bdc133 │ │ └─4599 /pause │ ├─37c042907e05507599d07f0efca1a27fc55497a9cb7dfd8d276d39d538cd72e9 │ │ └─8315 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─9426cf1e15e41a0de0075ef888a746747494c7377e9efcbd4ff855c89302e9a4 │ │ ├─26964 apache2 -DFOREGROUND │ │ ├─26998 (wsgi:k -DFOREGROUND │ │ ├─26999 (wsgi:k -DFOREGROUND │ │ ├─27000 (wsgi:k -DFOREGROUND │ │ ├─27001 (wsgi:k -DFOREGROUND │ │ ├─27003 apache2 -DFOREGROUND │ │ ├─27004 apache2 -DFOREGROUND │ │ ├─27005 apache2 -DFOREGROUND │ │ ├─27007 apache2 -DFOREGROUND │ │ ├─27010 apache2 -DFOREGROUND │ │ ├─27011 apache2 -DFOREGROUND │ │ ├─27013 apache2 -DFOREGROUND │ │ ├─27015 apache2 -DFOREGROUND │ │ ├─27016 apache2 -DFOREGROUND │ │ └─27017 apache2 -DFOREGROUND │ ├─ce80a4861b0a3118f0d154986904859cac5e94b447a04cbe301a73d9280308e6 │ │ └─23004 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─b8b21e6ea22fd814c9cfbf27c5df2caa110ab8cbda5138f26b0d5e3020cdaaaf │ │ └─12659 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─c29836bef5b4ab302cf79e121b6286a5861aff9df8073c9bc882eac479d32ac8 │ │ └─14714 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─ca6bc128ee2b5772ed21df2fc62b9edb24b7aaf0b5639f85b2edff2a0902b659 │ │ └─8355 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ └─523a67d6674047961298eaed178aea9487f66f1734c77a93b9787b355ba30133 │ └─4757 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount