Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─615 /lib/systemd/systemd --user │ │ └─616 (sd-pam) │ ├─session-4.scope │ │ ├─1351 sshd: zuul [priv] │ │ └─1364 sshd: zuul@notty │ └─session-1.scope │ ├─ 612 sshd: zuul [priv] │ ├─ 629 sshd: zuul@notty │ ├─ 771 /usr/bin/python3 │ ├─ 1355 ssh: /home/zuul/.ansible/cp/199.204.45.65-22-zuul [mux] │ ├─37747 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-zheidzqlvwquzuiggagmvsohldtqtslh ; /usr/bin/python3'"'"' && sleep 0' │ ├─37748 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-zheidzqlvwquzuiggagmvsohldtqtslh ; /usr/bin/python3' && sleep 0 │ ├─37749 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-zheidzqlvwquzuiggagmvsohldtqtslh ; /usr/bin/python3 │ ├─37750 /bin/sh -c echo BECOME-SUCCESS-zheidzqlvwquzuiggagmvsohldtqtslh ; /usr/bin/python3 │ ├─37751 /usr/bin/python3 │ ├─37752 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37754 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2875 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4431 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4a2d88e291e403f90beb2e8805e381a4c3fc8d34e7dbfe8174cec86763071b19 -address /run/containerd/containerd.sock │ │ ├─ 4470 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8331a4c1be637501598e17fa8a1bf649f8d75f46f0b718ca93164bd20847dfd7 -address /run/containerd/containerd.sock │ │ ├─ 4491 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c65e3df217b36c55a8cecc10d9f6e44ab0cd2b393a11b30b4713910e63df8d48 -address /run/containerd/containerd.sock │ │ ├─ 4500 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5a01416b879681f085bfe08e5bdd81b4366bf0d14a32e15c8059e437b5a0a7f2 -address /run/containerd/containerd.sock │ │ ├─ 4507 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 20b6b9b108cb49370329081160f1469fbab171035271ecd72eeabaa47132c592 -address /run/containerd/containerd.sock │ │ ├─ 5018 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e40cb1135a7cd3e1036c1a071110c1154d73c9cabefaaa9191d2edcf62bb6a72 -address /run/containerd/containerd.sock │ │ ├─ 5654 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 29a95ca167e548fc3518f7d2a53e7cec96e8233e6dc93339785170f554fd4319 -address /run/containerd/containerd.sock │ │ ├─ 5713 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6c4477796e58d4d8330341dd170d6a9226f7edbea30e3a4958bb6026a28f8a3b -address /run/containerd/containerd.sock │ │ ├─ 6850 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eb62884fdd802daffb9d8a2a0b6b95d0f5ce0bc2661f34f0d5c234d47d9dadb7 -address /run/containerd/containerd.sock │ │ ├─ 7190 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c079bfcf064e18780a79a7844e95ea6d902c531bd28472627d619f7c1dc0de6a -address /run/containerd/containerd.sock │ │ ├─ 7228 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d473e4449aaec4fb951746af493f64fec0ef285ece264eca732ac155de6df4ba -address /run/containerd/containerd.sock │ │ ├─ 7579 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 12310942dce39ce2d89a15575eed3e3bfb1ad97d234a05ed587843cd683695ad -address /run/containerd/containerd.sock │ │ ├─ 8032 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8d7c6c0aaa75d498761624e038bd561473960aaa382c50531b7051401328bb18 -address /run/containerd/containerd.sock │ │ ├─ 8077 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 99cb8b2e0d6c9199278a4208c0e11cc2af5ff79b1178bbe29c62b838f4f5671b -address /run/containerd/containerd.sock │ │ ├─ 8112 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6d41e209b4a2bdfd5ecd65d49e72539e0dc984712e84d78c56324ce7437df0ac -address /run/containerd/containerd.sock │ │ ├─10290 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 390b9449dd98b681e5e463dcce83dc4b424675dec8bd653e2a64251cc7b16ef1 -address /run/containerd/containerd.sock │ │ ├─10346 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 546c1be9ae2e1d23eba1864a8a8416d7d714c91ef279cc6948779c59cb885c39 -address /run/containerd/containerd.sock │ │ ├─10963 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f576c566f2bad6e08063d2e0bbcc007c52c986990c6e54996fe5131731c80612 -address /run/containerd/containerd.sock │ │ ├─11057 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aecd193d5cfa5a2885fd8fc65b6c3e936843707f8c0b8f51cf009ac3517951ea -address /run/containerd/containerd.sock │ │ ├─11345 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 35485e4e428f7f73552ece2d937d90ed9519d1887980df8fa7261eaf86eb373b -address /run/containerd/containerd.sock │ │ ├─11833 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 952eb956a81e4f671e4b4f179870b119d5dcbf9945ed6e8114a331ce78037208 -address /run/containerd/containerd.sock │ │ ├─12111 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7342ebc952953f64f9c3a4ecb3c4c0363f5ae0d322bb66b1c63639c4fa265364 -address /run/containerd/containerd.sock │ │ ├─13826 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9b607022d920d130689cd5600a38af556dfa57b0c477f4f70a52d16d2b8893ce -address /run/containerd/containerd.sock │ │ ├─14443 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 51c5cece1d3dff891ae57b62c2f995612137e30ab11143d308d9fa37c6e7ad0a -address /run/containerd/containerd.sock │ │ ├─17828 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 906a78a173b54fba60e515e823bd749d6a9affc93721afb2d282aa73a7ffeca9 -address /run/containerd/containerd.sock │ │ ├─20302 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a2fd5f8160012f58516f3767191921fe39fec9346f72ea8cd6bfffd2105b2e71 -address /run/containerd/containerd.sock │ │ ├─20369 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 331ad7ad1bcaadcbf413502bb716faba704ea4ecd49be4d5d36d17c3dedff067 -address /run/containerd/containerd.sock │ │ ├─20442 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 16ac37bdb6c656f31c39c949b9085bd03238793947b406239a5b07c895881d29 -address /run/containerd/containerd.sock │ │ ├─20467 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7c9943158071e2abf34225c8c69afa1ca8dd759b82108b1c4132ed5ab4b7769a -address /run/containerd/containerd.sock │ │ ├─21824 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dee720223c4b57b08f1682d38d63db6f281a3f51eb3c946ca2f423fe0ebe2056 -address /run/containerd/containerd.sock │ │ ├─21877 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 964af3929cd793bd711e94fd125cf09235e7420157bca8956ff7eb110c95e68e -address /run/containerd/containerd.sock │ │ ├─22738 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7ba430383047842ad8ba90c3cd713eac16338a718c2d853ac6a7aa22342d3ccb -address /run/containerd/containerd.sock │ │ ├─23988 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4ff98300c3d58482f88ba1e988494502aac6d86ebf49de1ba38b30c650addd04 -address /run/containerd/containerd.sock │ │ ├─29420 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e95b16d63ad780920ba45e75e877c37e8f2ecc6f93f56ebcc1bda6ed916e8a63 -address /run/containerd/containerd.sock │ │ ├─29496 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 41db51426b0da4641aa4fe1e7818cdb05968fe7c32cc221614795f97c9f88937 -address /run/containerd/containerd.sock │ │ └─29549 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 481d9f67efb838ddc34151c627051fcadf2988a4dc87809f1063583083a4c9da -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1092 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─328 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─542 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─558 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─532 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4862 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.65 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─559 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1284 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─538 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─777aeb40150f8ca0b5f6da243be63ede5b09a76c6756fc24a47b50b8423c1ccd │ │ ├─26345 apache2 -DFOREGROUND │ │ ├─26359 (wsgi:k -DFOREGROUND │ │ ├─26360 (wsgi:k -DFOREGROUND │ │ ├─26361 (wsgi:k -DFOREGROUND │ │ ├─26362 (wsgi:k -DFOREGROUND │ │ ├─26365 apache2 -DFOREGROUND │ │ ├─26366 apache2 -DFOREGROUND │ │ ├─26370 apache2 -DFOREGROUND │ │ ├─26371 apache2 -DFOREGROUND │ │ ├─26372 apache2 -DFOREGROUND │ │ ├─26373 apache2 -DFOREGROUND │ │ ├─26374 apache2 -DFOREGROUND │ │ ├─26375 apache2 -DFOREGROUND │ │ ├─26376 apache2 -DFOREGROUND │ │ └─26377 apache2 -DFOREGROUND │ ├─b2b91a16702b945a24cebaa9bf35003be99323f386d6fe48c3b216c375c4f9a2 │ │ └─17903 /secretgen-controller │ ├─16ac37bdb6c656f31c39c949b9085bd03238793947b406239a5b07c895881d29 │ │ └─20478 /pause │ ├─390b9449dd98b681e5e463dcce83dc4b424675dec8bd653e2a64251cc7b16ef1 │ │ └─10315 /pause │ ├─14e1f1451ed8527828487b9742d6f7a8b1fabe22af85fcdf377539a60d3f516f │ │ └─14550 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─51c5cece1d3dff891ae57b62c2f995612137e30ab11143d308d9fa37c6e7ad0a │ │ └─14469 /pause │ ├─14ce2b9b0b6d435eb4ec1f9e1b66d22b578e0057f5770b4197b1c2c51c619367 │ │ └─21623 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─eb62884fdd802daffb9d8a2a0b6b95d0f5ce0bc2661f34f0d5c234d47d9dadb7 │ │ └─6876 /pause │ ├─336605d3c50b7b115ca3236b0049aa41eb7c73f6bc2d71d42b6868bed7e18aa5 │ │ └─8326 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─f2b1bbca1d330c50d39e99475a5da4a8d9ef0ee7a3444654d5b75c1d62959ab5 │ │ └─10608 /server │ ├─8c10cc4cbe427ba1eef7bb8c8b0689810814148f6492ca7137fd5f045526f558 │ │ └─4686 kube-apiserver --advertise-address=199.204.45.65 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─481d9f67efb838ddc34151c627051fcadf2988a4dc87809f1063583083a4c9da │ │ └─29578 /pause │ ├─e95b16d63ad780920ba45e75e877c37e8f2ecc6f93f56ebcc1bda6ed916e8a63 │ │ └─29446 /pause │ ├─6d41e209b4a2bdfd5ecd65d49e72539e0dc984712e84d78c56324ce7437df0ac │ │ └─8141 /pause │ ├─952eb956a81e4f671e4b4f179870b119d5dcbf9945ed6e8114a331ce78037208 │ │ └─11857 /pause │ ├─02a2bfb969eefd46a7fe0010315773e3fa8738caac9bc2e223ce42ea8eda3014 │ │ ├─23075 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23094 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-14.2.5.1/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─23100 erl_child_setup 1048576 │ │ ├─23131 sh -s disksup │ │ ├─23133 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/memsup │ │ ├─23134 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/cpu_sup │ │ ├─23135 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─23136 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─23146 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/epmd -daemon │ │ └─23218 /bin/sh -s rabbit_disk_monitor │ ├─b29315f7c2bdffe1aaf75b80027c94dfaaa1ca9e3fc2584234188db337b803d8 │ │ └─20971 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─32b7248997ce1cc6698451ff1167926266f7aa612efe4c2dae6f88051fd63a52 │ │ ├─20727 python -u /app/sidecar.py │ │ ├─20955 python -u /app/sidecar.py │ │ └─20956 python -u /app/sidecar.py │ ├─38d865e99731177f9f87c7d166a59e019ac825db47f4027e9916949c1c237c45 │ │ └─4814 /kube-vip manager │ ├─906a78a173b54fba60e515e823bd749d6a9affc93721afb2d282aa73a7ffeca9 │ │ └─17853 /pause │ ├─f7b9864c3763b13e5d7e1926ce1c005b5e0ddb64d93aead2c3ee6f2cdfa7628c │ │ └─11126 /manager --metrics-bind-address=:9782 │ ├─f576c566f2bad6e08063d2e0bbcc007c52c986990c6e54996fe5131731c80612 │ │ └─10985 /pause │ ├─f22bd4ab1bac58cd7a99d9ef87d27ed68fdf3b4eb172abb961c0f9f3da7a69ea │ │ ├─30953 apache2 -DFOREGROUND │ │ ├─33174 (wsgi:h -DFOREGROUND │ │ ├─33175 (wsgi:h -DFOREGROUND │ │ ├─33176 (wsgi:h -DFOREGROUND │ │ ├─33177 (wsgi:h -DFOREGROUND │ │ ├─33178 (wsgi:h -DFOREGROUND │ │ ├─33179 apache2 -DFOREGROUND │ │ └─33180 apache2 -DFOREGROUND │ ├─b5eac3490c17a2a2706e5206acf0beb9fdb99d6c1c37b3a5d972917156357195 │ │ ├─30918 apache2 -DFOREGROUND │ │ ├─33332 (wsgi:h -DFOREGROUND │ │ ├─33333 (wsgi:h -DFOREGROUND │ │ ├─33334 (wsgi:h -DFOREGROUND │ │ ├─33335 (wsgi:h -DFOREGROUND │ │ ├─33336 (wsgi:h -DFOREGROUND │ │ ├─33337 apache2 -DFOREGROUND │ │ └─33338 apache2 -DFOREGROUND │ ├─a4b29f126e05687c8059ec6833c42b70e75cfe856cb851c9bf9049d26fcc3bca │ │ ├─6120 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6489 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─a17924eaabe50b354ffc537e73320069d4cf92d2e11fb6188c2bc52a07773a67 │ │ └─12459 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─8d7c6c0aaa75d498761624e038bd561473960aaa382c50531b7051401328bb18 │ │ └─8054 /pause │ ├─99cb8b2e0d6c9199278a4208c0e11cc2af5ff79b1178bbe29c62b838f4f5671b │ │ └─8111 /pause │ ├─43d6677db4424a73bed99d4793aafda7f2026d93a7f55d2659c715e8e2009ac1 │ │ └─8286 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─7ab73b3b7fdbf43de4d7fd9373a8b2612f01b9dd92aa57ae9d68d61cbcf5da00 │ │ └─22348 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-65.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─2d6583c491ba7891decbb8ba7212417378af7e89ea4b61056621bb52a3a1eb50 │ │ └─12406 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─ddfcaa26037614b01ada2a5876ef56836b106016d48a5ab2399ed801b20e343c │ │ └─14190 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─46cc7af56cdf5b4765941eb37b59018e5f6d857e8a30fec386738bcae834269b │ │ ├─20759 python -u /app/sidecar.py │ │ ├─20957 python -u /app/sidecar.py │ │ └─20958 python -u /app/sidecar.py │ ├─d473e4449aaec4fb951746af493f64fec0ef285ece264eca732ac155de6df4ba │ │ └─7250 /pause │ ├─29a95ca167e548fc3518f7d2a53e7cec96e8233e6dc93339785170f554fd4319 │ │ └─5677 /pause │ ├─9b607022d920d130689cd5600a38af556dfa57b0c477f4f70a52d16d2b8893ce │ │ └─13847 /pause │ ├─773381892e6696da72a69fef4c2f43f63b7974ae234c98cd3888f5aff0ab3e4e │ │ └─11220 /manager --metrics-bind-address=:8080 │ ├─17907b90db2ca341bd5f5c8c54101796081e6f37dac785db92677ece252f6410 │ │ └─22624 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─8331a4c1be637501598e17fa8a1bf649f8d75f46f0b718ca93164bd20847dfd7 │ │ └─4569 /pause │ ├─a1ce526905fde42f4f7fe4c3c70c84a8a5cb8436e1916aee04a61f47dcf24e0b │ │ └─8247 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─dc3c44aa113e85ef0d8962376793e3d485403d24abbccfc1cceb0be6b8c9fcc9 │ │ └─4710 etcd --advertise-client-urls=https://199.204.45.65:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.65:2380 --initial-cluster=instance=https://199.204.45.65:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.65:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.65:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─12a42b545c08dbec6ee0c7e9952f95549c28814f75d93809351d6ec626478a4b │ │ └─22670 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─578e4d0a288a214a1b19ef944febd0ff32fc60456f796d13377f249751544205 │ │ └─22587 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-65.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─de562c09d63558380b9c19db6735aa020e6aac14c71b29a6c3266b4b0b04959f │ │ └─4677 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─4ff98300c3d58482f88ba1e988494502aac6d86ebf49de1ba38b30c650addd04 │ │ └─24011 /pause │ ├─3ec92a7ba75e2f40b462a5f51ffc9d579a846593f842428c53e0b53133d5f7b6 │ │ └─22786 /bin/oauth2-proxy │ ├─35485e4e428f7f73552ece2d937d90ed9519d1887980df8fa7261eaf86eb373b │ │ └─11367 /pause │ ├─06f3d4716af3cddebcc83f4d7c3a55ec4981177db342a8d845bd518885bfe1c8 │ │ └─4724 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─e37d4fc62b1048ef7e069e899981744fecad55246a0a3d061f3f1535e3e597f5 │ │ └─14300 /bin/memcached_exporter │ ├─7ba430383047842ad8ba90c3cd713eac16338a718c2d853ac6a7aa22342d3ccb │ │ └─22762 /pause │ ├─7c9943158071e2abf34225c8c69afa1ca8dd759b82108b1c4132ed5ab4b7769a │ │ └─20506 /pause │ ├─6c4477796e58d4d8330341dd170d6a9226f7edbea30e3a4958bb6026a28f8a3b │ │ └─5738 /pause │ ├─b217e5aca741234f87ea8b9d728ce42146902a9920c60f48e37ab862650772fb │ │ └─7653 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─331ad7ad1bcaadcbf413502bb716faba704ea4ecd49be4d5d36d17c3dedff067 │ │ └─20394 /pause │ ├─a2fd5f8160012f58516f3767191921fe39fec9346f72ea8cd6bfffd2105b2e71 │ │ └─20350 /pause │ ├─dee720223c4b57b08f1682d38d63db6f281a3f51eb3c946ca2f423fe0ebe2056 │ │ └─21845 /pause │ ├─4a2d88e291e403f90beb2e8805e381a4c3fc8d34e7dbfe8174cec86763071b19 │ │ └─4461 /pause │ ├─546c1be9ae2e1d23eba1864a8a8416d7d714c91ef279cc6948779c59cb885c39 │ │ └─10371 /pause │ ├─7342ebc952953f64f9c3a4ecb3c4c0363f5ae0d322bb66b1c63639c4fa265364 │ │ └─12136 /pause │ ├─12310942dce39ce2d89a15575eed3e3bfb1ad97d234a05ed587843cd683695ad │ │ └─7603 /pause │ ├─20b6b9b108cb49370329081160f1469fbab171035271ecd72eeabaa47132c592 │ │ └─4610 /pause │ ├─3ca6d8f612eb587b64b5e0f6ca4c58745698377c2795fa56a6ed6d7593910e60 │ │ └─5071 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─aecd193d5cfa5a2885fd8fc65b6c3e936843707f8c0b8f51cf009ac3517951ea │ │ └─11081 /pause │ ├─d9eef6278bcfaa022f35bf610bd25a8cc4d40ac0cb86cada29f58225fbfc5582 │ │ ├─30959 apache2 -DFOREGROUND │ │ ├─33086 (wsgi:h -DFOREGROUND │ │ ├─33087 (wsgi:h -DFOREGROUND │ │ ├─33088 (wsgi:h -DFOREGROUND │ │ ├─33089 (wsgi:h -DFOREGROUND │ │ ├─33090 (wsgi:h -DFOREGROUND │ │ ├─33091 apache2 -DFOREGROUND │ │ └─33092 apache2 -DFOREGROUND │ ├─bdcda692a8d5898f77268502bed75ae16b7c76e2919e43d32f75f66cfe5d2a15 │ │ └─11656 percona-xtradb-cluster-operator │ ├─71913593623080c762c4f9f54367dfa5ad59b734d3316f044a9e00acaf113da7 │ │ └─23041 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─c079bfcf064e18780a79a7844e95ea6d902c531bd28472627d619f7c1dc0de6a │ │ └─7218 /pause │ ├─c65e3df217b36c55a8cecc10d9f6e44ab0cd2b393a11b30b4713910e63df8d48 │ │ └─4586 /pause │ ├─f17bfffce2a34725946e6dd27e3860b0b8b9b8b0c310ad8da443653f498e26ec │ │ └─21926 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─316406c8aea79011990ce600e02e60d26467d7df7dc31c369df202a446775e66 │ │ └─7314 /coredns -conf /etc/coredns/Corefile │ ├─9dc011180181bf707cc98a332597df51152b3041bc08fb0b09b07dc39ca0d9d2 │ │ ├─12308 mysqld --wsrep_start_position=00b0cbc4-42c8-11f1-8821-034dd978f427:20 │ │ └─12435 /var/lib/mysql/mysql-state-monitor │ ├─4193fff6e665e42112ba4e31def92f80f56feb37aeae0a2e04cc8f608ec463b4 │ │ └─22804 /bin/oauth2-proxy │ ├─a5a37a460a2bcca61eb630bbd91732399ce5c2d715dfc5a6eaaf5a5381ff7926 │ │ ├─12260 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─14800 haproxy -sf 157 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─964af3929cd793bd711e94fd125cf09235e7420157bca8956ff7eb110c95e68e │ │ └─21900 /pause │ ├─5866f7c40e29578010fd0a75faf1cdb22f7da9d9aaadec0b1487c4db5b77a159 │ │ └─21043 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─54bf70530fad75a8873d22701aca19dc718ae087bc4a40da9e01992a9b9b753b │ │ └─5917 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─610a2abee98a364ae7eff8432180610cd84ac8ac71224e737067e1ac0befbc97 │ │ └─22383 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─e40cb1135a7cd3e1036c1a071110c1154d73c9cabefaaa9191d2edcf62bb6a72 │ │ └─5044 /pause │ ├─774f007321d77bd34d0f422482ae8b104dd68ae612ac52e6b65fac9f493d082f │ │ └─7285 /coredns -conf /etc/coredns/Corefile │ ├─56edfe56d40ceac03d7e65968382553b48036912ceb8481bdd2c5535efc5525b │ │ └─6923 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─41db51426b0da4641aa4fe1e7818cdb05968fe7c32cc221614795f97c9f88937 │ │ └─29523 /pause │ ├─5a01416b879681f085bfe08e5bdd81b4366bf0d14a32e15c8059e437b5a0a7f2 │ │ └─4584 /pause │ └─8329388075673d862435703a75f6e45d42dfca77edcba809498d159402ac44ff │ ├─10571 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ ├─10583 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ ├─10711 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ ├─30504 nginx: worker process │ ├─30505 nginx: worker process │ └─30506 nginx: cache manager process ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount