Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─541 /lib/systemd/systemd --user │ │ └─542 (sd-pam) │ ├─session-4.scope │ │ ├─1267 sshd: zuul [priv] │ │ └─1280 sshd: zuul@notty │ └─session-1.scope │ ├─ 538 sshd: zuul [priv] │ ├─ 555 sshd: zuul@notty │ ├─ 686 /usr/bin/python3 │ ├─ 1271 ssh: /home/zuul/.ansible/cp/199.204.45.169-22-zuul [mux] │ ├─16916 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-ejtlcjukbsljbaexxqclxrhnowlaehge ; /usr/bin/python3'"'"' && sleep 0' │ ├─16917 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-ejtlcjukbsljbaexxqclxrhnowlaehge ; /usr/bin/python3' && sleep 0 │ ├─16918 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-ejtlcjukbsljbaexxqclxrhnowlaehge ; /usr/bin/python3 │ ├─16919 /bin/sh -c echo BECOME-SUCCESS-ejtlcjukbsljbaexxqclxrhnowlaehge ; /usr/bin/python3 │ ├─16920 /usr/bin/python3 │ ├─16970 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─16971 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 38 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 9487 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─11075 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 30fa27343b986f33a28942293b31284a9631e89a7999984b9320e423f2105185 -address /run/containerd/containerd.sock │ │ ├─11091 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3162c7c65359b04f4eaca1f29302a68411c9b84f6b9ca87cb20742a478075f8e -address /run/containerd/containerd.sock │ │ ├─11100 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7ce9c5ab8f2ebaee2b87be433a8140a96736ed96402f4b293ea486d0e268e1a7 -address /run/containerd/containerd.sock │ │ ├─11104 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 69210836ef8bf2a8835066ef7e9c4972cbe384073478e2bdb954243ff92dc7df -address /run/containerd/containerd.sock │ │ ├─11123 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dfd69a236d79742e0d74aa45b2a6dc0caeb385a1754e1b10ff856fd9a6e66e20 -address /run/containerd/containerd.sock │ │ ├─11590 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a2d683b65cf391a43786464ef0c37f1249cebb7ca580eca1eb8a0d044e9c9503 -address /run/containerd/containerd.sock │ │ ├─12194 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 64c0e58a3488a50f1d00ff7fb385f4fc095460e8f4240bd430de02428d8747fe -address /run/containerd/containerd.sock │ │ ├─12417 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 18a99e72ad30d045973abe1e4ca0f58fa0898a43ef8d0ecefa1196b79b93665e -address /run/containerd/containerd.sock │ │ ├─14016 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9f7b8099623aaf1793b119bf30a5214e1cc56ddba8fa5c5968f5e81de269ba09 -address /run/containerd/containerd.sock │ │ ├─14053 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2c8644144a7c6346a9c6791c4cf4ed7b55783475f67f244d81da7e33b9bea627 -address /run/containerd/containerd.sock │ │ └─14106 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 23667fe64abb0c2bae6ad6fe733e9ef292f82eb7ec31ff66c03d3cf94f64fc86 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1009 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─361 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ ├─ 265 /lib/systemd/systemd-udevd │ │ ├─16967 /lib/systemd/systemd-udevd │ │ └─16968 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─470 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─482 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─457 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─11461 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.169 --pod-infra-container-image=registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─235 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─488 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─269 /lib/systemd/systemd-resolved │ ├─system-lvm2\x2dpvscan.slice │ ├─cloud-init.service │ ├─dbus.service │ │ └─453 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─270 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─469 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─459 /lib/systemd/systemd-logind ├─k8s.io │ ├─23667fe64abb0c2bae6ad6fe733e9ef292f82eb7ec31ff66c03d3cf94f64fc86 │ │ └─14138 /pause │ ├─69210836ef8bf2a8835066ef7e9c4972cbe384073478e2bdb954243ff92dc7df │ │ └─11195 /pause │ ├─a2d683b65cf391a43786464ef0c37f1249cebb7ca580eca1eb8a0d044e9c9503 │ │ └─11614 /pause │ ├─1bb91144bebac7be3dce500f29f6eea05868fcb5760ef4bd5a61b6b8a0ff64f3 │ │ └─12384 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─9f7b8099623aaf1793b119bf30a5214e1cc56ddba8fa5c5968f5e81de269ba09 │ │ └─14037 /pause │ ├─7fbd52857811410bdf41e70a7a3163f5d2314a76b8e5b344f81b5a0793e97e31 │ │ └─11640 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─5a2f011f59a6f8c3fd696479d87bcd7b79fa41135afe98bc450d51bda2286cb3 │ │ └─14371 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─27d94a93c8942989df0ecff736e65f9498c9b207684afc438ae7129f590f5e14 │ │ └─11291 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─2c8644144a7c6346a9c6791c4cf4ed7b55783475f67f244d81da7e33b9bea627 │ │ └─14079 /pause │ ├─1fe7d58d51e9b461c022e81ab6d9a8857c8949db01fc32866c77f2bf7df1f78e │ │ └─14200 /coredns -conf /etc/coredns/Corefile │ ├─18a99e72ad30d045973abe1e4ca0f58fa0898a43ef8d0ecefa1196b79b93665e │ │ └─12440 /pause │ ├─d5a3c7a0a9726105b109e80e8ead95f24b1264d71feb690b66417b950ba81739 │ │ ├─13226 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─13705 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─dfd69a236d79742e0d74aa45b2a6dc0caeb385a1754e1b10ff856fd9a6e66e20 │ │ └─11220 /pause │ ├─64c0e58a3488a50f1d00ff7fb385f4fc095460e8f4240bd430de02428d8747fe │ │ └─12218 /pause │ ├─6b8ddf54f5ddc082278b3868154fe6755f83ae7577558a897247dd4bc7ac5807 │ │ └─11312 etcd --advertise-client-urls=https://199.204.45.169:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.169:2380 --initial-cluster=instance=https://199.204.45.169:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.169:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.169:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─c2ccdd54e65b3ad32de2f3eb33ab1592a685835d723d2115781305cb337ddb88 │ │ └─14163 /coredns -conf /etc/coredns/Corefile │ ├─7ce9c5ab8f2ebaee2b87be433a8140a96736ed96402f4b293ea486d0e268e1a7 │ │ └─11229 /pause │ ├─30fa27343b986f33a28942293b31284a9631e89a7999984b9320e423f2105185 │ │ └─11200 /pause │ ├─3162c7c65359b04f4eaca1f29302a68411c9b84f6b9ca87cb20742a478075f8e │ │ └─11185 /pause │ ├─d269ea749f0cdb902615df8e4f45d8cbd76773adef90bb6c15ed3abbd0ace54f │ │ └─11340 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─22593bc3281eb391cde0354489ae2b529eee5e43a82363776e75ee6236f1d39a │ │ └─11414 /kube-vip manager │ └─910c753e281c99e16830335679d1aec6fe244a350b4833426cc3394102f47569 │ └─11351 kube-apiserver --advertise-address=199.204.45.169 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount