Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─616 /lib/systemd/systemd --user │ │ └─617 (sd-pam) │ ├─session-4.scope │ │ ├─1361 sshd: zuul [priv] │ │ └─1374 sshd: zuul@notty │ └─session-1.scope │ ├─ 613 sshd: zuul [priv] │ ├─ 631 sshd: zuul@notty │ ├─ 768 /usr/bin/python3 │ ├─ 1365 ssh: /home/zuul/.ansible/cp/199.204.45.169-22-zuul [mux] │ ├─41916 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-luiwuypmsqgxkkwejqjhhmqgajrqieps ; /usr/bin/python3'"'"' && sleep 0' │ ├─41917 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-luiwuypmsqgxkkwejqjhhmqgajrqieps ; /usr/bin/python3' && sleep 0 │ ├─41918 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-luiwuypmsqgxkkwejqjhhmqgajrqieps ; /usr/bin/python3 │ ├─41919 /bin/sh -c echo BECOME-SUCCESS-luiwuypmsqgxkkwejqjhhmqgajrqieps ; /usr/bin/python3 │ ├─41920 /usr/bin/python3 │ ├─41923 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─41925 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2885 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4467 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4e7f934eb1bed77a5c1c1225aee699acecbb5ccd6ff29958673cacabfffc9ee7 -address /run/containerd/containerd.sock │ │ ├─ 4503 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b84add9540fb7b3e06ce1796a5ad9336dc12ebf5b572bf4b3a69a6c177bd44fb -address /run/containerd/containerd.sock │ │ ├─ 4555 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0cbc7b7b2653c0cd4d70077bc4ce7e04e55a19631461abab9aec9b70fea51707 -address /run/containerd/containerd.sock │ │ ├─ 4573 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f527b48b702b68444fa6d975039fd121fe4bd8957c8d8d987c8817982cf13eb7 -address /run/containerd/containerd.sock │ │ ├─ 4633 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0ad1459232bd85d50071219a6b95cd53f152c88faa57ce94186614fa858596fc -address /run/containerd/containerd.sock │ │ ├─ 5033 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e8c8be07321957cffa1da56b080b297872adb2c204a4a404ad95358bca2a6f3b -address /run/containerd/containerd.sock │ │ ├─ 5686 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 16a4baab7c5b14bac8a118674364c85f9bfa241387a27d29b434c29947f9160a -address /run/containerd/containerd.sock │ │ ├─ 5725 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fe30b35242cd037aa51128958624f44538b8fdb66669723998130b00ba404582 -address /run/containerd/containerd.sock │ │ ├─ 6904 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8b950a7c716d667520338f29dad4d88bb3d74ee233fd2804e6a2adb2a6e25f53 -address /run/containerd/containerd.sock │ │ ├─ 7249 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e6a398914f01b691b42f6d5e97fa3fb5a606383d9e873b1c2bd04dc3e025e06d -address /run/containerd/containerd.sock │ │ ├─ 7289 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 58dc98b92e8d01c5e51204d479caec2f454ef6a82f9665a2a440453b65925910 -address /run/containerd/containerd.sock │ │ ├─ 7649 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a988d459763cf8ed2b8790903c223a555329895b1ab35bdc73d080f10fd506d0 -address /run/containerd/containerd.sock │ │ ├─ 8102 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1ed7b1448d53b8b367eafaf4d543737466d14b6f6064e134626d671d0330861b -address /run/containerd/containerd.sock │ │ ├─ 8140 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 87730506ae2e661a47001420388e598ac1e1aa340b821abab5ade65bda92671c -address /run/containerd/containerd.sock │ │ ├─ 8216 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 12dbfb234740b8f71989fce82cbfda0b924bb11f852bea9f37f3b7e50fa54bc4 -address /run/containerd/containerd.sock │ │ ├─10446 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 569d955ce594aefdf515ce0b9f13519e04e2e86fcac1f1cda795bbb5d0b8116b -address /run/containerd/containerd.sock │ │ ├─10525 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aed48fb54f341f247c5fc55744575c76a9b1a1f40ce4e19423451a7b5e5b73ca -address /run/containerd/containerd.sock │ │ ├─11171 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1eb98dbfdd2fd5223bdd437ae423d1803fb75c196671e9787d168d4149e6d7ce -address /run/containerd/containerd.sock │ │ ├─11253 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 88a2f7629c5f3e7e3f9f968c9e766cfcade2cf45e4233ab9cf49f35447cb4022 -address /run/containerd/containerd.sock │ │ ├─11525 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 90dfce9a7003bc11d12f90ba56d3c3921b15f5f61e67f81e9e7740d1231ae9d6 -address /run/containerd/containerd.sock │ │ ├─11836 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id db193022ff599e2ddccc23774a21736e19a368309dfa98d2f52623839dc8fb2d -address /run/containerd/containerd.sock │ │ ├─12273 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ad6c068e2c6f514eb9d431f3c2b05771dc21c4e6d6fa46755acca62d314497c4 -address /run/containerd/containerd.sock │ │ ├─14428 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f6b961bf1f838c8fde0427787f4a968c09705b55c670877e2b817935825d073e -address /run/containerd/containerd.sock │ │ ├─15038 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4ce62c9f83ad77354ae8017613d1621bc3a403607c2e7906b2d5c5258d86a7ce -address /run/containerd/containerd.sock │ │ ├─20159 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f9dc9c901ebb2ddb34c099a29dd2f410fdc6b513907bc8748b9cf58aef6d8987 -address /run/containerd/containerd.sock │ │ ├─23070 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c372afff3a5b7ee2fc5f934e058d846680a8018997c3df764b75bb92ef5e2890 -address /run/containerd/containerd.sock │ │ ├─23335 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 011e73357c76cf6cd6217f6e47293b739b0780edc7d5cc8be8fae898e0222b27 -address /run/containerd/containerd.sock │ │ ├─23380 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ef2065105a06341093815dcd17827ea6cb07f864ed4f50389bdb46a989066535 -address /run/containerd/containerd.sock │ │ ├─23425 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 82c06d3480f2b56c9f510f3dbf85a736d89584fbef98c5cfbe1e66da788c7f50 -address /run/containerd/containerd.sock │ │ ├─24606 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 234984ee643a314cff4be0bc215259bd9084bcd2b958176d9424a5afb25d784a -address /run/containerd/containerd.sock │ │ ├─24625 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c88a073bb199136febe4e4c14644408d62b7367617f03f4d5742fbcb2cfd25f7 -address /run/containerd/containerd.sock │ │ ├─25626 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 299fbb3de5f454501bfc06b2d294109a904934a73cd2502e176f86c00c07f861 -address /run/containerd/containerd.sock │ │ ├─27778 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d88f56f406a5c4ba9c67c8b454296ef61dfe2f60067efd0d5fbeed19ce8e20f3 -address /run/containerd/containerd.sock │ │ ├─33235 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e1a88d696239ccd810c035996fe3878f08c364c774835578a7748b7ee741a4a2 -address /run/containerd/containerd.sock │ │ ├─33273 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2fc03d464151c8f32d2dabd464f983e4c4551fe7cdbac896fc27cc35e7854140 -address /run/containerd/containerd.sock │ │ └─33299 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b7f9782848de8ab4a2cb4f462c3c768db2849eb69ddefdbb979be8c8cab4c549 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1092 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─539 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─558 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─532 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4901 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.169 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ ├─ 562 sshd: /usr/sbin/sshd -D [listener] 1 of 10-100 startups │ │ ├─41897 sshd: root [priv] │ │ └─41898 sshd: root [net] │ ├─uuidd.service │ │ └─1294 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─330 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─331 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─538 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─a988d459763cf8ed2b8790903c223a555329895b1ab35bdc73d080f10fd506d0 │ │ └─7671 /pause │ ├─f9210d3b38d420f5216df0d5ed2967f690184702318991efdc7504d81e7d78bd │ │ ├─34757 apache2 -DFOREGROUND │ │ ├─36928 (wsgi:h -DFOREGROUND │ │ ├─36929 (wsgi:h -DFOREGROUND │ │ ├─36930 (wsgi:h -DFOREGROUND │ │ ├─36931 (wsgi:h -DFOREGROUND │ │ ├─36932 (wsgi:h -DFOREGROUND │ │ ├─36933 apache2 -DFOREGROUND │ │ └─36934 apache2 -DFOREGROUND │ ├─08db6afa567efcc51a9e9dec357fee7fc2d65126c6aaa5c7f85ebf076ef0a995 │ │ ├─34743 apache2 -DFOREGROUND │ │ ├─36850 (wsgi:h -DFOREGROUND │ │ ├─36851 (wsgi:h -DFOREGROUND │ │ ├─36852 (wsgi:h -DFOREGROUND │ │ ├─36853 (wsgi:h -DFOREGROUND │ │ ├─36854 (wsgi:h -DFOREGROUND │ │ ├─36855 apache2 -DFOREGROUND │ │ └─36856 apache2 -DFOREGROUND │ ├─1eb98dbfdd2fd5223bdd437ae423d1803fb75c196671e9787d168d4149e6d7ce │ │ └─11194 /pause │ ├─234984ee643a314cff4be0bc215259bd9084bcd2b958176d9424a5afb25d784a │ │ └─24646 /pause │ ├─569d955ce594aefdf515ce0b9f13519e04e2e86fcac1f1cda795bbb5d0b8116b │ │ └─10476 /pause │ ├─e8c8be07321957cffa1da56b080b297872adb2c204a4a404ad95358bca2a6f3b │ │ └─5056 /pause │ ├─b71a5247ff7eabcd4c4596a7139c38f464e8a00822cabf25d8b4b8ea9dd3d4d1 │ │ └─25868 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─54f0ff321a21ff05cd71ea3112aae5db76b9f44e8c8e6264cd6c167c0c5be5a7 │ │ └─15276 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─3df57a58b7f808c453ea9df753fcafbf97571760bc9ce12cb95ec226afb9cf11 │ │ └─8350 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─87730506ae2e661a47001420388e598ac1e1aa340b821abab5ade65bda92671c │ │ └─8164 /pause │ ├─aed48fb54f341f247c5fc55744575c76a9b1a1f40ce4e19423451a7b5e5b73ca │ │ └─10548 /pause │ ├─c54d50e0e393a2eb942846ce8a17adbe02ee83fdf4a1b909cd2b234402babab6 │ │ └─5082 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─b7f9782848de8ab4a2cb4f462c3c768db2849eb69ddefdbb979be8c8cab4c549 │ │ └─33335 /pause │ ├─686bd600f616117036a2437bbeb8f14554529eccab56df58048fee83cbb0f930 │ │ ├─30131 apache2 -DFOREGROUND │ │ ├─30176 (wsgi:k -DFOREGROUND │ │ ├─30177 (wsgi:k -DFOREGROUND │ │ ├─30178 (wsgi:k -DFOREGROUND │ │ ├─30179 (wsgi:k -DFOREGROUND │ │ ├─30182 apache2 -DFOREGROUND │ │ ├─30183 apache2 -DFOREGROUND │ │ ├─30184 apache2 -DFOREGROUND │ │ ├─30186 apache2 -DFOREGROUND │ │ ├─30187 apache2 -DFOREGROUND │ │ ├─30189 apache2 -DFOREGROUND │ │ ├─30192 apache2 -DFOREGROUND │ │ ├─30193 apache2 -DFOREGROUND │ │ ├─30194 apache2 -DFOREGROUND │ │ └─30195 apache2 -DFOREGROUND │ ├─e1a88d696239ccd810c035996fe3878f08c364c774835578a7748b7ee741a4a2 │ │ └─33259 /pause │ ├─c6cffed00248a41f454abff7216ce9a4a217e16b0415a590f96dabb53101269d │ │ └─4723 kube-apiserver --advertise-address=199.204.45.169 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─3623b8a0dbe13677d921259a56ed386e3ce65550e1ddafc63d5ae37f29591af7 │ │ └─11330 /manager --metrics-bind-address=:9782 │ ├─5465bec716ccf3c3f675430d49dab49f218d74a8280ecdafb515e3b8ba7328c5 │ │ └─23753 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─6da07174332e5c70eff7e8165c97f55e444adb605ad206632487720d7ad25973 │ │ ├─24688 python -u /app/sidecar.py │ │ ├─24849 python -u /app/sidecar.py │ │ └─24850 python -u /app/sidecar.py │ ├─54a8db76f4d84726f14134afcb590453f800bb8cf2bfd64513f0a2042fd57f9a │ │ ├─12453 mysqld --wsrep_start_position=7e1e5851-3e83-11f1-b0f9-e29dbdae642b:20 │ │ └─12604 /var/lib/mysql/mysql-state-monitor │ ├─19c28223c0d96c76fa4be817d2a3a63bf0697d3ed199f991e0ed72ad8fec088c │ │ └─26793 /bin/oauth2-proxy │ ├─88a2f7629c5f3e7e3f9f968c9e766cfcade2cf45e4233ab9cf49f35447cb4022 │ │ └─11277 /pause │ ├─f6b961bf1f838c8fde0427787f4a968c09705b55c670877e2b817935825d073e │ │ └─14452 /pause │ ├─ef2065105a06341093815dcd17827ea6cb07f864ed4f50389bdb46a989066535 │ │ └─23401 /pause │ ├─e892c86baeb5beec9bafeef6c0f26acad320fbc9717e6d52264f6573a1ac9b9f │ │ └─15137 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─f527b48b702b68444fa6d975039fd121fe4bd8957c8d8d987c8817982cf13eb7 │ │ └─4613 /pause │ ├─011e73357c76cf6cd6217f6e47293b739b0780edc7d5cc8be8fae898e0222b27 │ │ └─23360 /pause │ ├─82c06d3480f2b56c9f510f3dbf85a736d89584fbef98c5cfbe1e66da788c7f50 │ │ └─23457 /pause │ ├─32b848889fa653a792328e135026c44a7541d28c2aafb70778733c8ba0349a5b │ │ └─6963 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─90dfce9a7003bc11d12f90ba56d3c3921b15f5f61e67f81e9e7740d1231ae9d6 │ │ └─11548 /pause │ ├─8b950a7c716d667520338f29dad4d88bb3d74ee233fd2804e6a2adb2a6e25f53 │ │ └─6927 /pause │ ├─58dc98b92e8d01c5e51204d479caec2f454ef6a82f9665a2a440453b65925910 │ │ └─7313 /pause │ ├─b84add9540fb7b3e06ce1796a5ad9336dc12ebf5b572bf4b3a69a6c177bd44fb │ │ └─4528 /pause │ ├─d88f56f406a5c4ba9c67c8b454296ef61dfe2f60067efd0d5fbeed19ce8e20f3 │ │ └─27803 /pause │ ├─e5d099df1cf2eb5101e589b6f6124c223554834613bbc0d3f26b2cb9e9439845 │ │ ├─24725 python -u /app/sidecar.py │ │ ├─24851 python -u /app/sidecar.py │ │ └─24852 python -u /app/sidecar.py │ ├─c107bab5a67b32587a320b44912dc029e5001f4fbd721e56748199bb923620b8 │ │ ├─35102 apache2 -DFOREGROUND │ │ ├─37007 (wsgi:h -DFOREGROUND │ │ ├─37008 (wsgi:h -DFOREGROUND │ │ ├─37009 (wsgi:h -DFOREGROUND │ │ ├─37010 (wsgi:h -DFOREGROUND │ │ ├─37011 (wsgi:h -DFOREGROUND │ │ ├─37012 apache2 -DFOREGROUND │ │ └─37013 apache2 -DFOREGROUND │ ├─db193022ff599e2ddccc23774a21736e19a368309dfa98d2f52623839dc8fb2d │ │ └─11862 /pause │ ├─8f2fc0efeedb5b91f6a2578dcee7f2d6352c90252b89061fe91d98f12821c645 │ │ └─26075 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─c88a073bb199136febe4e4c14644408d62b7367617f03f4d5742fbcb2cfd25f7 │ │ └─24668 /pause │ ├─3353879ed0a18285c720ef999035074eb6cfc501ed36602d50d89b6104b26b4a │ │ └─4744 etcd --advertise-client-urls=https://199.204.45.169:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.169:2380 --initial-cluster=instance=https://199.204.45.169:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.169:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.169:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─2fc03d464151c8f32d2dabd464f983e4c4551fe7cdbac896fc27cc35e7854140 │ │ └─33310 /pause │ ├─2a4b04c757d09b7da304808cac9acf6ce50f0b25ccb0d9a90da7707e23107593 │ │ ├─12411 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13962 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─65e7fb1518490d33c153138ec6344d577dfbe10012a99485eaadc2350b591f88 │ │ └─26000 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-169.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─09b95f1a6d32ae669e28bf201be4e8454fe43f388027fcf7f7cd66ccabb489d0 │ │ ├─6165 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6534 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─3ab78a64c1d4091e481c1083d94140728e51c7577f943f8fa4032f61d127dc4b │ │ ├─26804 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─26827 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─26833 erl_child_setup 1048576 │ │ ├─26880 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─26881 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─26891 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─27027 /bin/sh -s rabbit_disk_monitor │ ├─18723d2f0cc8e79d17530b553f0e066d6046b01e6e367f1f5a5233c4d3d921bd │ │ └─10843 /server │ ├─16a4baab7c5b14bac8a118674364c85f9bfa241387a27d29b434c29947f9160a │ │ └─5711 /pause │ ├─d0c40addd21a4b2eef8c6f5a0ccba81d53f3cfe535690f6b2c51ddb73ab7b10f │ │ └─11718 percona-xtradb-cluster-operator │ ├─ed215e39c8a78ba26aafae2f306fb53430fba9182961d5ac671408cb5ed32540 │ │ └─7344 /coredns -conf /etc/coredns/Corefile │ ├─c8ca4fc2353778f11b623ff26fb35844090cde274c276edef550edca55a3cae5 │ │ └─4763 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─459671226a9f92210d481675737e2dc89582dff3f66bd22c67f3e37645bce7e2 │ │ └─7369 /coredns -conf /etc/coredns/Corefile │ ├─84669b7370fdabf316df199608cd44e4e4c68da1e1e0e6c41c02ccb1881d8a7f │ │ └─12740 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─e6a398914f01b691b42f6d5e97fa3fb5a606383d9e873b1c2bd04dc3e025e06d │ │ └─7274 /pause │ ├─fe30b35242cd037aa51128958624f44538b8fdb66669723998130b00ba404582 │ │ └─5755 /pause │ ├─f3a07572c57d8e89bf5032e9b1612e1d6fe72cc400b1e8ec93eda6798a287d9a │ │ └─25727 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─2eca62774d6a4fefc93c3be66585a824d9570c55b4f3ecfd16846e8aab94f698 │ │ ├─10766 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10779 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10904 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─34574 nginx: worker process │ │ ├─34575 nginx: worker process │ │ └─34576 nginx: cache manager process │ ├─1577d7c6a1f0d941aea097fb07877a894fe21b073d8010d91dd563d8c131d95c │ │ └─26038 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─4ce62c9f83ad77354ae8017613d1621bc3a403607c2e7906b2d5c5258d86a7ce │ │ └─15063 /pause │ ├─4e7f934eb1bed77a5c1c1225aee699acecbb5ccd6ff29958673cacabfffc9ee7 │ │ └─4490 /pause │ ├─299fbb3de5f454501bfc06b2d294109a904934a73cd2502e176f86c00c07f861 │ │ └─25649 /pause │ ├─fc48880f3583d746e0396d7e57a9b1b28edec58afd012d7a5ef88d641b9e47b8 │ │ └─4852 /kube-vip manager │ ├─c372afff3a5b7ee2fc5f934e058d846680a8018997c3df764b75bb92ef5e2890 │ │ └─23098 /pause │ ├─12dbfb234740b8f71989fce82cbfda0b924bb11f852bea9f37f3b7e50fa54bc4 │ │ └─8241 /pause │ ├─4ba347543f5e965f4d6ac5c75f890b71dafa09aa861067a4ebb11064a980a0c9 │ │ └─25591 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─bf4aaab505242159836ecdeaa9b55146c46d5416e048d677c780871041ab7bc6 │ │ └─5966 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─0ad1459232bd85d50071219a6b95cd53f152c88faa57ce94186614fa858596fc │ │ └─4656 /pause │ ├─2f7929e3a0d7bb456e371133b805710c9380b0b27ee99d8a7b1941278673fdc9 │ │ └─25835 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-169.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─fa750924e329a778f4a1c46bb2eb0fe328865805c41105287bc75fd886aaac16 │ │ └─12552 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─ad6c068e2c6f514eb9d431f3c2b05771dc21c4e6d6fa46755acca62d314497c4 │ │ └─12296 /pause │ ├─3f5f6dd9095939360cdc9cf14fb5ba29b148a6b1151dd7913092bb489a843a4b │ │ └─7811 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─ac731ada5ca4ad900e84e3804bbd8fb4c0d29feefcb3279557d16fef40e843ac │ │ └─11605 /manager --metrics-bind-address=:8080 │ ├─1ed7b1448d53b8b367eafaf4d543737466d14b6f6064e134626d671d0330861b │ │ └─8125 /pause │ ├─d7d222f28945963c3d348219ada8bccaeee7f61592786be85c28203c424aeda5 │ │ └─26700 /bin/oauth2-proxy │ ├─f9dc9c901ebb2ddb34c099a29dd2f410fdc6b513907bc8748b9cf58aef6d8987 │ │ └─20184 /pause │ ├─b0287155c434f8f9076cc34a4210bbb7746fbe6cc57432c89cab24532a6b926b │ │ └─24896 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─7bc85853c846217c3bd6a9043ee9d381d985a7bd87a5800fe866c93fff4e9a4c │ │ └─4703 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─0cbc7b7b2653c0cd4d70077bc4ce7e04e55a19631461abab9aec9b70fea51707 │ │ └─4605 /pause │ ├─38088d0ed711f9d71e69c767782f952998eb68c64e7030f915f9991ab3d11191 │ │ └─24281 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─66b746f52f0a82a748b81db826ead61452781aa400548c667693411b688a65ef │ │ └─8390 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─27cdbc35e51bad8476b867f69cba6ac41ac4e647ea795c4eae72bb1020dfe8fd │ │ └─15435 /bin/memcached_exporter │ ├─32771f3579ea827ef2b283568f02e7f78392a2506b3038435e6b6263000974cc │ │ └─20333 /secretgen-controller │ └─7f73ec22fc3cc8c6d1e014550ffb3172f68f9f24db01ecee1f01b4a9a4ec58a1 │ └─8311 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount