Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─618 /lib/systemd/systemd --user │ │ └─619 (sd-pam) │ ├─session-22.scope │ │ ├─54956 sshd: zuul [priv] │ │ └─55065 sshd: zuul@notty │ ├─session-8.scope │ │ ├─8868 sshd: zuul [priv] │ │ └─8881 sshd: zuul@notty │ └─session-1.scope │ ├─ 615 sshd: zuul [priv] │ ├─ 632 sshd: zuul@notty │ ├─ 769 /usr/bin/python3 │ ├─ 8872 ssh: /home/zuul/.ansible/cp/273f2097de [mux] │ ├─55049 ssh: /home/zuul/.ansible/cp/199.204.45.109-22-zuul [mux] │ ├─55630 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-npwoetjdnebpknffcvuqcodlwsvmshin ; /usr/bin/python3'"'"' && sleep 0' │ ├─55631 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-npwoetjdnebpknffcvuqcodlwsvmshin ; /usr/bin/python3' && sleep 0 │ ├─55632 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-npwoetjdnebpknffcvuqcodlwsvmshin ; /usr/bin/python3 │ ├─55633 /bin/sh -c echo BECOME-SUCCESS-npwoetjdnebpknffcvuqcodlwsvmshin ; /usr/bin/python3 │ ├─55634 /usr/bin/python3 │ ├─55635 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─55637 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 3026 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4614 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aac98279a06dadd756dda6728f741c93683e139472c83e9ca5e195d1bb768ba6 -address /run/containerd/containerd.sock │ │ ├─ 4652 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5b3d1f969d1b18c6b20c8a6b7b2cf371e7672f089e28294f3df8a718b0e7a352 -address /run/containerd/containerd.sock │ │ ├─ 4654 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3b4b460ee3f07d540f23a82711f2a7470cf6d6f75c6bca864ab69858c2bcdba6 -address /run/containerd/containerd.sock │ │ ├─ 4664 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b7e5971f5915862a1c761e9b3011ef18893f3c3cb3a082df5f8713076ee9a59f -address /run/containerd/containerd.sock │ │ ├─ 4688 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a679613b57b6a00e21438ac1ebe1da5fb252bbb66d767af9b191ba8ed41db156 -address /run/containerd/containerd.sock │ │ ├─ 5214 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4370ef3982be2f70d009a1f57233493a6938810cbfb14f1b9c8fd4ebe0d036c9 -address /run/containerd/containerd.sock │ │ ├─ 5778 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9a16223d9309d41a5928873547752df15481e94e5811a527f2716c7621909746 -address /run/containerd/containerd.sock │ │ ├─ 5815 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f5b903cca2c99015223f08d4d56fbc22b9f9c4edc695691edd9deb7c03426df5 -address /run/containerd/containerd.sock │ │ ├─ 7030 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 72b154a01ee4de9d9f08df9252dbaec2797fd801bcb836039f7a87dbe45f679b -address /run/containerd/containerd.sock │ │ ├─ 7365 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7c1c94569e6f90e011ecf941a7af34cfdc8a38d9e229e6338f734db29993dbf1 -address /run/containerd/containerd.sock │ │ ├─ 7453 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f2dc9ba70bef82f20723950b5f0790c75861d4cb0496eb306cf486bdb3a9f02e -address /run/containerd/containerd.sock │ │ ├─ 7806 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ed85273c23ced7b0efb6320d2ab26deb94f63757ce15a7a0aa8652e4d8b74090 -address /run/containerd/containerd.sock │ │ ├─16657 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aa54ce09314092d25414bb766ecbed1649f3daa71366ff5906cf0ade4d820db8 -address /run/containerd/containerd.sock │ │ ├─16666 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e40332e047d4395d7fb9501550a1bc1860aabaa6dd986970347554c4f37bf323 -address /run/containerd/containerd.sock │ │ ├─16710 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id abfd99d9b0352f7ce09c803a9c10d4ef07e34cc3e191494c8c3c94c40f90bd02 -address /run/containerd/containerd.sock │ │ ├─16749 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a407b91a617debec30da21307fb7050b7c40bbf52deddeecdde0521fe2becea6 -address /run/containerd/containerd.sock │ │ ├─17490 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 527ffd4a1d6af8fed1a6cda00e7bf3ad71cea48d0b293ce9252f48ec46497560 -address /run/containerd/containerd.sock │ │ ├─17620 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 77c47546b98fe3635ec857350bdc4d9098dcc6ff58e66698a6ee36f906a25731 -address /run/containerd/containerd.sock │ │ ├─20758 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 794f30c2d483df8081403720bc5a44103c77edcd2407c8c75a6853ab5860ee6a -address /run/containerd/containerd.sock │ │ ├─21016 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8b1d5a2b710b8f9ce384accc13c547313d8fab01954252575ced3827a84fe4a5 -address /run/containerd/containerd.sock │ │ ├─21227 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 595c726c616d59599493e0820f5ebf563fa6eeef51d8459720b032c12da12847 -address /run/containerd/containerd.sock │ │ ├─21503 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8aba257e3648748ce34cae7e4212ab3c1abaed45415678361897c9029dcfa43b -address /run/containerd/containerd.sock │ │ ├─22006 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 127ca726280a334e8319c9fe1f37430d4aca847d0b6f96ac877d5ff190979fa3 -address /run/containerd/containerd.sock │ │ ├─22050 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c343bb2f0f619e9eacfb82847d3ed36e6b195cf32c7dbfc5b15d081230f0ca6d -address /run/containerd/containerd.sock │ │ ├─25839 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fc674e065888e228aea29a36ac5a6b65b242f4554f0600cf8ef2e83ae2765d78 -address /run/containerd/containerd.sock │ │ ├─26445 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c722d47bd9ad7b2212148832a5203f72b02b202e7ef8f872eca6464258f45e6f -address /run/containerd/containerd.sock │ │ ├─39035 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ab6f50efc21a547391fb888d77be8d4de69eeca8031c8422576c0ddc6b46d8ab -address /run/containerd/containerd.sock │ │ ├─44661 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4cb31c4a064da49ec88713723290e051cdbf266a056f22a81ac5599cdcd638e9 -address /run/containerd/containerd.sock │ │ ├─45074 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a2ddb61ed28de16350d105966a0c88e768d6a2ceaecfe38595d91d0afe2bff86 -address /run/containerd/containerd.sock │ │ ├─45178 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f1e57caad1b0232284e4adaed02c89a3cc9efa9470c2a8cbd22cf0f2e35920c2 -address /run/containerd/containerd.sock │ │ ├─45241 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 39b1bb458009a73f0c58b0a18fa81da178beaa5ba45f0f7d9bd927ad3551abcd -address /run/containerd/containerd.sock │ │ ├─52372 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 112028342d4c621650a7dc7dcb92564f0fa9b2c5965285d2a343a335121c46b4 -address /run/containerd/containerd.sock │ │ ├─52505 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 04dea292d01476f31e2bb933de5180579ea069b157466cc57ca431bc6cb9a778 -address /run/containerd/containerd.sock │ │ ├─52576 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9b6ce09790cf8e308db8c55fa7b929040962bdf7a7c21522234fa9afd46864b4 -address /run/containerd/containerd.sock │ │ ├─52623 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5812dcbcc5ecfdd772aa8fc3d5311122ef1297b42e3c41c42cf030607b39db2b -address /run/containerd/containerd.sock │ │ ├─54055 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a0c74b1ba79139bb2f3d85198c549cb32c40b26e440608a71d5c640f0e3428fa -address /run/containerd/containerd.sock │ │ └─54174 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e03f90f8ddc12b4d052bad1f617d4683e9a03042d17b7b8b642002e58cffea7b -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1092 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─438 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─540 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─560 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─533 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─5047 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.109 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─565 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1442 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─530 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─539 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─536 /lib/systemd/systemd-logind ├─k8s.io │ ├─0ae8d794bea6ef1e2097b7ea6a787d62174471e2a29912e9473d13e0e1d0b9f6 │ │ └─55171 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─bb74d861bd1793cb4796e6117b2b32b08d48094888b40ddddd0e93ea375054e3 │ │ ├─53040 python -u /app/sidecar.py │ │ ├─53180 python -u /app/sidecar.py │ │ └─53181 python -u /app/sidecar.py │ ├─4beb521247df30af8acfdaa1b7ba98b54dcf6723362a030acceb3f528fa2cec7 │ │ └─22566 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─4cb31c4a064da49ec88713723290e051cdbf266a056f22a81ac5599cdcd638e9 │ │ └─44686 /pause │ ├─53ff0ce994ff85b8fc5670ef87bd4001ea1255f7305807d5f17022b389264837 │ │ └─55449 /bin/oauth2-proxy │ ├─aa54ce09314092d25414bb766ecbed1649f3daa71366ff5906cf0ade4d820db8 │ │ └─16692 /pause │ ├─127ca726280a334e8319c9fe1f37430d4aca847d0b6f96ac877d5ff190979fa3 │ │ └─22029 /pause │ ├─d334656860f08c85c269c157568336eedb4a3560fa1a414e1abcbb9796d298bd │ │ └─16982 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─06c854344a148d206ddfb4e6b980dcf60545bf7fed2b71a2413ea89eac6bd8b1 │ │ └─17374 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─23d6de71467da063a25d667e7a3f8e370e389372af5b2b4e9fe247ff576cea26 │ │ └─5383 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─e03f90f8ddc12b4d052bad1f617d4683e9a03042d17b7b8b642002e58cffea7b │ │ └─54197 /pause │ ├─f1e57caad1b0232284e4adaed02c89a3cc9efa9470c2a8cbd22cf0f2e35920c2 │ │ └─45209 /pause │ ├─794f30c2d483df8081403720bc5a44103c77edcd2407c8c75a6853ab5860ee6a │ │ └─20786 /pause │ ├─cef81689d983071d26acfc7f74e325509318f6185f7222ea430d7a5a7caff362 │ │ └─7140 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─595c726c616d59599493e0820f5ebf563fa6eeef51d8459720b032c12da12847 │ │ └─21251 /pause │ ├─0e3eb79387dccca2e3838db350582918b0184837807f9291b40055d271970317 │ │ └─55096 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-109.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─39d7043340f4d2c0f09a36e63ba9358a15d45c2646a958c3184d4f27122ebeed │ │ └─55426 /bin/oauth2-proxy │ ├─5363f01e6adc7f35bb6f32bf8ae98ed3add02bd9615043b5ef61bcd8bc818d7b │ │ ├─19853 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─19888 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─20094 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─52756 nginx: worker process │ │ ├─52757 nginx: worker process │ │ └─52758 nginx: cache manager process │ ├─b7e5971f5915862a1c761e9b3011ef18893f3c3cb3a082df5f8713076ee9a59f │ │ └─4755 /pause │ ├─f6624c8c5abc91893fafdc465b2a86fe3367ecd3c94ec2e75936c653eada089d │ │ ├─47798 apache2 -DFOREGROUND │ │ ├─49534 (wsgi:h -DFOREGROUND │ │ ├─49535 (wsgi:h -DFOREGROUND │ │ ├─49536 (wsgi:h -DFOREGROUND │ │ ├─49537 (wsgi:h -DFOREGROUND │ │ ├─49538 (wsgi:h -DFOREGROUND │ │ ├─49539 apache2 -DFOREGROUND │ │ └─49540 apache2 -DFOREGROUND │ ├─8b1d5a2b710b8f9ce384accc13c547313d8fab01954252575ced3827a84fe4a5 │ │ └─21040 /pause │ ├─7c1c94569e6f90e011ecf941a7af34cfdc8a38d9e229e6338f734db29993dbf1 │ │ └─7390 /pause │ ├─f6636d0a4b6a829310cb0ab2e7eb89d413a10a41000e4398a85dd4ef0bc50b27 │ │ └─21599 /manager --metrics-bind-address=:9782 │ ├─77c47546b98fe3635ec857350bdc4d9098dcc6ff58e66698a6ee36f906a25731 │ │ └─17644 /pause │ ├─5812dcbcc5ecfdd772aa8fc3d5311122ef1297b42e3c41c42cf030607b39db2b │ │ └─52648 /pause │ ├─3700384d19fd830062b13e78da4f6806cf442f55b52921e71f157a3ee6195516 │ │ └─19964 /server │ ├─8aba257e3648748ce34cae7e4212ab3c1abaed45415678361897c9029dcfa43b │ │ └─21528 /pause │ ├─9c6fc0f2b94f3c90eb723d374193b586d6c69441e7b2798ddfabb1749021e0a3 │ │ └─22838 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─b17121f10f399f4e54c3f816dd730f3a48c4b6a934daa19af7c2c86e0f31b0da │ │ └─7606 /coredns -conf /etc/coredns/Corefile │ ├─f5b903cca2c99015223f08d4d56fbc22b9f9c4edc695691edd9deb7c03426df5 │ │ └─5846 /pause │ ├─a8cff98d27fc8013cc214bfe62c23de372f169ffb5e9bb67edf5a2c2d79a41d3 │ │ └─54831 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-109.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─3b4b460ee3f07d540f23a82711f2a7470cf6d6f75c6bca864ab69858c2bcdba6 │ │ └─4758 /pause │ ├─04dea292d01476f31e2bb933de5180579ea069b157466cc57ca431bc6cb9a778 │ │ └─52549 /pause │ ├─a407b91a617debec30da21307fb7050b7c40bbf52deddeecdde0521fe2becea6 │ │ └─16787 /pause │ ├─909a5d5096fbe94848cebf6ff187652fcb516c2e2933407222b697c462fbf26d │ │ └─21371 percona-xtradb-cluster-operator │ ├─39b1bb458009a73f0c58b0a18fa81da178beaa5ba45f0f7d9bd927ad3551abcd │ │ └─45278 /pause │ ├─a99abf63c4a1758cbb5c407db1869e7e635bb9428c8e2923530f1149c5453606 │ │ ├─39361 apache2 -DFOREGROUND │ │ ├─39376 (wsgi:k -DFOREGROUND │ │ ├─39377 (wsgi:k -DFOREGROUND │ │ ├─39378 (wsgi:k -DFOREGROUND │ │ ├─39379 (wsgi:k -DFOREGROUND │ │ ├─39380 apache2 -DFOREGROUND │ │ ├─39384 apache2 -DFOREGROUND │ │ ├─39386 apache2 -DFOREGROUND │ │ ├─39388 apache2 -DFOREGROUND │ │ ├─39389 apache2 -DFOREGROUND │ │ ├─39391 apache2 -DFOREGROUND │ │ ├─39392 apache2 -DFOREGROUND │ │ ├─39393 apache2 -DFOREGROUND │ │ ├─39394 apache2 -DFOREGROUND │ │ └─39395 apache2 -DFOREGROUND │ ├─a2ddb61ed28de16350d105966a0c88e768d6a2ceaecfe38595d91d0afe2bff86 │ │ └─45101 /pause │ ├─ddcb327aaabce762881bba1e813c4eb889dcdb9903cde1c1b675990559a82492 │ │ └─4873 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─13e323401db10f4443364c14dee0fce63b3b25ddc00952e04e96928f08cf66d9 │ │ └─55127 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─8a14ecc46d4ad4cf3f7f5c2f9ad3bd6194f16f912f2fe4bd89d325fc84e57f6b │ │ └─44876 /secretgen-controller │ ├─f420060fbee7607373ad4849c6085c7f61e07c4887311d080a6e19bfa23e32ff │ │ └─53224 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─e5d0a65099cce0e44063f0ebe8028711e3abad415879783d3206ea911925919e │ │ └─17445 /bin/memcached_exporter │ ├─2aea627dde8c54cc555c684ef9a18fa264df4ebcc13d10218c072b94e2280437 │ │ └─54866 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─4370ef3982be2f70d009a1f57233493a6938810cbfb14f1b9c8fd4ebe0d036c9 │ │ └─5237 /pause │ ├─2e198b3d82094d2e7bf9498c38b5f6e163e0d8544b6e56ab563d66f121473b89 │ │ └─22167 valkey-server *:6379 │ ├─d9404fae37e04c0e46d5ce92001a268a3a433fa76a7e1ba4a79e01956e2e529e │ │ ├─27298 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─27316 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─27322 erl_child_setup 1048576 │ │ ├─27420 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─27421 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─27431 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─27536 /bin/sh -s rabbit_disk_monitor │ ├─6b77ae06f15b8d7eb5fbffca53829742aa443d65fe1fb605d60b5945da01d474 │ │ ├─22468 mysqld --wsrep_start_position=37a6b530-409a-11f1-8950-db91be6f5944:20 │ │ └─22618 /var/lib/mysql/mysql-state-monitor │ ├─c722d47bd9ad7b2212148832a5203f72b02b202e7ef8f872eca6464258f45e6f │ │ └─26468 /pause │ ├─d2eca17d2d0b9b8a0737fd0cd2c8bed1171df5f4da9c81906fb2dac0426841a6 │ │ └─17122 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─527ffd4a1d6af8fed1a6cda00e7bf3ad71cea48d0b293ce9252f48ec46497560 │ │ └─17519 /pause │ ├─0f897002aaa77e2c7f0ca7651df111bca1b7abe6d45905e4fdcbb0878fb8111b │ │ ├─6236 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6568 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─aac98279a06dadd756dda6728f741c93683e139472c83e9ca5e195d1bb768ba6 │ │ └─4703 /pause │ ├─afa3c6678c26526a5365bec0c8fc6fe916d753cade6d156f249e1743453b406b │ │ └─22797 redis_exporter │ ├─9a16223d9309d41a5928873547752df15481e94e5811a527f2716c7621909746 │ │ └─5802 /pause │ ├─e1da62951b2bdbcbb831e99cdece3348a0fb94c1e6ea9279f1fc7d7f03b8fc5b │ │ ├─53065 python -u /app/sidecar.py │ │ ├─53207 python -u /app/sidecar.py │ │ └─53208 python -u /app/sidecar.py │ ├─72b154a01ee4de9d9f08df9252dbaec2797fd801bcb836039f7a87dbe45f679b │ │ └─7054 /pause │ ├─fc674e065888e228aea29a36ac5a6b65b242f4554f0600cf8ef2e83ae2765d78 │ │ └─25861 /pause │ ├─e40332e047d4395d7fb9501550a1bc1860aabaa6dd986970347554c4f37bf323 │ │ └─16736 /pause │ ├─a12a6fe5e9e30634f7c91b55b4cd10e57bce2eff75c34ccefa2a9350f87c2764 │ │ ├─22377 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─26056 haproxy -sf 315 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─7b65a3261c27a6650316e1ca038ce2d84811db40ca0d9752277a55404e58a40b │ │ └─53151 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─1b6efd6548ec8307f5821148b0a85afdc02a4e1355ac4bbef1ac2ff92cc76950 │ │ └─6034 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─a679613b57b6a00e21438ac1ebe1da5fb252bbb66d767af9b191ba8ed41db156 │ │ └─4784 /pause │ ├─882c5b51298c6eada2576274e0ac9579370c6cab3cf4a348471ca7fca3811f8b │ │ └─7640 /coredns -conf /etc/coredns/Corefile │ ├─ed85273c23ced7b0efb6320d2ab26deb94f63757ce15a7a0aa8652e4d8b74090 │ │ └─7830 /pause │ ├─902b4b15ad1cc4b387d2480807a7213659485ba06bf83de48384986e4054535e │ │ └─4910 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─f2dc9ba70bef82f20723950b5f0790c75861d4cb0496eb306cf486bdb3a9f02e │ │ └─7481 /pause │ ├─1125a083b9a884922e4071a86572c96b126edbc6de383cef41659eba0b370b53 │ │ └─54572 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─112028342d4c621650a7dc7dcb92564f0fa9b2c5965285d2a343a335121c46b4 │ │ └─52404 /pause │ ├─ade5622d18810945ea073ff786c7e81a9c86dfbe54e526753c3e4c69a29c3cb7 │ │ ├─47756 apache2 -DFOREGROUND │ │ ├─49525 (wsgi:h -DFOREGROUND │ │ ├─49526 (wsgi:h -DFOREGROUND │ │ ├─49527 (wsgi:h -DFOREGROUND │ │ ├─49528 (wsgi:h -DFOREGROUND │ │ ├─49529 (wsgi:h -DFOREGROUND │ │ ├─49530 apache2 -DFOREGROUND │ │ └─49531 apache2 -DFOREGROUND │ ├─abfd99d9b0352f7ce09c803a9c10d4ef07e34cc3e191494c8c3c94c40f90bd02 │ │ └─16776 /pause │ ├─c786fd28a760bf97b73b11f00cf27a8b3bc0cf37154de7c9874ffb6c311cf02c │ │ └─53311 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─9b6ce09790cf8e308db8c55fa7b929040962bdf7a7c21522234fa9afd46864b4 │ │ └─52603 /pause │ ├─e12bcd3bbff641abe72a2318bc239c076c35aa2bbae9b864ad9d75f35d8f209c │ │ └─26526 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─ab6f50efc21a547391fb888d77be8d4de69eeca8031c8422576c0ddc6b46d8ab │ │ └─39060 /pause │ ├─5b3d1f969d1b18c6b20c8a6b7b2cf371e7672f089e28294f3df8a718b0e7a352 │ │ └─4762 /pause │ ├─a0c74b1ba79139bb2f3d85198c549cb32c40b26e440608a71d5c640f0e3428fa │ │ └─54095 /pause │ ├─2a102d982cf5391d0b85727d7e37b0d1b7820c8bc21c08803aae276096404e22 │ │ ├─47775 apache2 -DFOREGROUND │ │ ├─49606 (wsgi:h -DFOREGROUND │ │ ├─49607 (wsgi:h -DFOREGROUND │ │ ├─49608 (wsgi:h -DFOREGROUND │ │ ├─49609 (wsgi:h -DFOREGROUND │ │ ├─49610 (wsgi:h -DFOREGROUND │ │ ├─49611 apache2 -DFOREGROUND │ │ └─49612 apache2 -DFOREGROUND │ ├─9a8ffacd9d047ebcb811b7b991e66b48b7e32da5e7b829bbd95ae484bdf94d14 │ │ └─8934 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─dfc4e59a96ec4a1692d4d565b00d8ac5aeba46efc10605a64ad8bf5a3767e0eb │ │ └─5000 /kube-vip manager │ ├─c343bb2f0f619e9eacfb82847d3ed36e6b195cf32c7dbfc5b15d081230f0ca6d │ │ └─22074 /pause │ ├─1ca2e1257415ccf9c239a5c2ffb1c832e718920e53f1e1f33391bdb597deb295 │ │ └─54159 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─fda5935ee88b3d5586b8003ed2b160d4ec3eb351185e17053da4dd56cdf4e318 │ │ └─21636 /manager --metrics-bind-address=:8080 │ ├─fb37009ee7273031fac79c4b9abc1720a805860c4915f249c72d5a16a3f274f6 │ │ └─4897 kube-apiserver --advertise-address=199.204.45.109 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─4611a3f2c8d6814e1b12689b8582f05b799e40134ce1f09ab56e0066a953c437 │ │ └─17086 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─0271b628e5cb9bc67302e3dc5ac20ac798df1d192adcd4a9843c56d6180fe815 │ │ └─4848 etcd --advertise-client-urls=https://199.204.45.109:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.109:2380 --initial-cluster=instance=https://199.204.45.109:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.109:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.109:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ └─75419040a2d7606025c22694cf51d7a0029d0328b2ffab71f67acef7e2cd228c │ └─22422 valkey-server *:26379 [sentinel] ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount