Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─621 /lib/systemd/systemd --user │ │ └─622 (sd-pam) │ ├─session-4.scope │ │ ├─1358 sshd: zuul [priv] │ │ └─1371 sshd: zuul@notty │ └─session-1.scope │ ├─ 618 sshd: zuul [priv] │ ├─ 635 sshd: zuul@notty │ ├─ 772 /usr/bin/python3 │ ├─ 1362 ssh: /home/zuul/.ansible/cp/199.19.213.240-22-zuul [mux] │ ├─38769 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-rishoritijdnqhgrqpcknrgmltkorpby ; /usr/bin/python3'"'"' && sleep 0' │ ├─38770 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-rishoritijdnqhgrqpcknrgmltkorpby ; /usr/bin/python3' && sleep 0 │ ├─38771 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-rishoritijdnqhgrqpcknrgmltkorpby ; /usr/bin/python3 │ ├─38772 /bin/sh -c echo BECOME-SUCCESS-rishoritijdnqhgrqpcknrgmltkorpby ; /usr/bin/python3 │ ├─38773 /usr/bin/python3 │ ├─38774 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38776 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2880 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4452 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4ffc8f45c78204e9bbb511a2f058e44e1acd542850856bc4748120bf4b3aafec -address /run/containerd/containerd.sock │ │ ├─ 4484 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c761b54c8c762ed2aecd024b3f007f35fbb80ec88a84e649e210f916b481b06b -address /run/containerd/containerd.sock │ │ ├─ 4502 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f895e14f921f5f278122d09424126716c2a2b8206619570b749fa2ed5e5db676 -address /run/containerd/containerd.sock │ │ ├─ 4509 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6f6378ddbe81fc7c82988a1808a5f887e30fcc62f95f1e240348d3951b1cad5a -address /run/containerd/containerd.sock │ │ ├─ 4510 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6fee37510e3d28697ff0261685a0e6dcf55a54663138ced131409e2cea996406 -address /run/containerd/containerd.sock │ │ ├─ 5030 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 484aecde5efedf7cc39784292338a7e18476a1a35a3fd4c3a3d45b0138d3a5ab -address /run/containerd/containerd.sock │ │ ├─ 5759 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5640e80f85e54d3b75f3f237164ef465f6c933d93cb045ecbf6c92144a8e79ee -address /run/containerd/containerd.sock │ │ ├─ 5798 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f19d53921f23f29049a7dc8abc4d42ae6c31b26820a60efed74675d1147452be -address /run/containerd/containerd.sock │ │ ├─ 6872 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f7ca8e166db936595e5d459118cc257ed115809fd20bdba83c8d9a79b18aa555 -address /run/containerd/containerd.sock │ │ ├─ 7225 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d80b8918d45a37ab35b83aaa4af34d79a71e50e02735fec9f82435ea3b86109e -address /run/containerd/containerd.sock │ │ ├─ 7263 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a0eb1ea8daed2e0700828c027a9da49f988baf59a0d6e8442a009f511190af57 -address /run/containerd/containerd.sock │ │ ├─ 7625 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c4f87f546475559daf1cfc11882b831842b23f51a86c343a0d947a77c2fb2836 -address /run/containerd/containerd.sock │ │ ├─ 8061 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e214d57abaca8372a1610860ef8fefbbd062135e00ac89e575fb44ee3259edb3 -address /run/containerd/containerd.sock │ │ ├─ 8102 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5c04dab7adfdac3fd7e93c9ea94da22b19841fedc69ea94eaedd4b56b83aa852 -address /run/containerd/containerd.sock │ │ ├─ 8148 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6651ff2bf86f5353f32537447d31a39a6b393649110736f4ce3199ff602213e5 -address /run/containerd/containerd.sock │ │ ├─ 9998 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d2fc705bbd11b13d53c907f6012036854c07cbf653282a8fad798bf95620ddc4 -address /run/containerd/containerd.sock │ │ ├─10074 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 978e61d29bbd80cdc3fcc7cdf01b3f4320974de4b7c889f7687f197477306e3a -address /run/containerd/containerd.sock │ │ ├─10867 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 38f48ad7fdd9fc99282f387ada6064732a7729113dfc87618bd44d7cd76bc20b -address /run/containerd/containerd.sock │ │ ├─10963 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 960eeb898eb92d88ce65a257e5a8ddef8a67b9379e77a51c16bf26c65bf765da -address /run/containerd/containerd.sock │ │ ├─11260 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c30092a6ab39d394a11fad23314015101dbdba44e211e719349ea5298fe13a95 -address /run/containerd/containerd.sock │ │ ├─11587 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8f545695a0b69baa87bb7786e0336f2098fde22994deb8192c86c3463fa94369 -address /run/containerd/containerd.sock │ │ ├─11887 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 85233f585ae9919683efe9462ac369f8b92d0f053f7a8c90ccc98cf4097a632b -address /run/containerd/containerd.sock │ │ ├─13569 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c4a24c543ce3eb218c422339c1d8859a045142c2cc5b88c006a8c12250c6681b -address /run/containerd/containerd.sock │ │ ├─14194 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c6b44b82e4064765d8cd1f02023ebca1523ca9fa0b27a1d412184a591af558f9 -address /run/containerd/containerd.sock │ │ ├─17781 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 728c9e2ffbb132c06bda6c4be4dc63617ed657fff4a094989deec01c5c443f81 -address /run/containerd/containerd.sock │ │ ├─20305 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d8fa704da6abdebd983991fe1d0d63d038dff583d12cf6d5462fd04e92696b22 -address /run/containerd/containerd.sock │ │ ├─20430 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e1862b1e6b4f30c1c3daa6bef8a07dcd26349db95bfdb41d39dfc2dd55904a1a -address /run/containerd/containerd.sock │ │ ├─20474 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2259a88ba4c41d3b46f89b09b43122f9060dceafe8355baf62bd9cdccaeb8446 -address /run/containerd/containerd.sock │ │ ├─20514 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8aa955cc1bc1b143c76da2d91ea156047a67f3ca072737b98b61ae68a53b1f24 -address /run/containerd/containerd.sock │ │ ├─21463 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 26ceccb0194adcf5454d517b723addd8ef11d9f39e48b508c8d236609f4a2937 -address /run/containerd/containerd.sock │ │ ├─21544 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8a2d808ea9f245ad3d4be6e7c936cd4999c9c6ce2d50d7903eb70652111d35e5 -address /run/containerd/containerd.sock │ │ ├─22510 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4949d9706dd06d816af558504a93637e432ad74fe210c686f9586f4cd29a2ac4 -address /run/containerd/containerd.sock │ │ ├─24071 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b59447733898e625844fc2ef69fced0fd6884a8ebd39378bc86ad20758e678b8 -address /run/containerd/containerd.sock │ │ ├─29408 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 09b1a0828accd64c43095cd2a9326f781f14eb496c975b60f10d128afb277c0f -address /run/containerd/containerd.sock │ │ ├─29448 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f028c780e06c091ad1715af36ba998789f23c1d698f308f8eafb0dccdb742d44 -address /run/containerd/containerd.sock │ │ └─29494 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b382f2ca8b8aaa9dd0388c81be11ffe612406fb8d615a17696c3d0ad707b635f -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1096 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─440 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─330 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─563 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─535 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4858 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.240 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─568 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1293 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─334 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─335 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─540 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─3e8c940276f832335536eb7d849809055a3a3323a0795824e15e6ba1baff7139 │ │ └─12183 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─74815a3a6194c724c15bdb867c1b35657ab27a6b69c31af419639138a322acbf │ │ └─11417 percona-xtradb-cluster-operator │ ├─4949d9706dd06d816af558504a93637e432ad74fe210c686f9586f4cd29a2ac4 │ │ └─22533 /pause │ ├─dca8387103d1cc12c1b9487e082848716488dd29708f4d6c9117f876541299a0 │ │ └─8311 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─a7398d196a29dfb49fb64b5f0ff793c2c9eaeaee885ec1a84e0c2df51854a087 │ │ └─8349 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─3de6d1673e86ccd087d456a966e189188f133b8fd268c350762b2c185b274e98 │ │ └─14032 /bin/memcached_exporter │ ├─481a8c8352771f48cbd9ff40de9381a618f8a1824d3116a4a17df0ef280d87dc │ │ ├─21344 python -u /app/sidecar.py │ │ ├─21534 python -u /app/sidecar.py │ │ └─21535 python -u /app/sidecar.py │ ├─f8755f45e061a7bbf3387a690d3f14b61c1c89909bda3fe9e9520582e41b3287 │ │ └─21066 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─6707ef81183ad6f8ffb81d6f8cc9b9fd74561e5646238a2b318c56144a2b8d87 │ │ ├─33038 apache2 -DFOREGROUND │ │ ├─34880 (wsgi:h -DFOREGROUND │ │ ├─34881 (wsgi:h -DFOREGROUND │ │ ├─34882 (wsgi:h -DFOREGROUND │ │ ├─34883 (wsgi:h -DFOREGROUND │ │ ├─34884 (wsgi:h -DFOREGROUND │ │ ├─34885 apache2 -DFOREGROUND │ │ └─34886 apache2 -DFOREGROUND │ ├─1d369b167753554ea82b2397e34f2e33642928d829c0562af4c25135ba242d49 │ │ └─4734 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─6f6378ddbe81fc7c82988a1808a5f887e30fcc62f95f1e240348d3951b1cad5a │ │ └─4633 /pause │ ├─b44c877c23fcbd542ed7aa5a877a761837f90f7e0715910e94f05f86cea2c9fa │ │ └─4761 kube-apiserver --advertise-address=199.19.213.240 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─c30092a6ab39d394a11fad23314015101dbdba44e211e719349ea5298fe13a95 │ │ └─11285 /pause │ ├─4ffc8f45c78204e9bbb511a2f058e44e1acd542850856bc4748120bf4b3aafec │ │ └─4578 /pause │ ├─a0eb1ea8daed2e0700828c027a9da49f988baf59a0d6e8442a009f511190af57 │ │ └─7288 /pause │ ├─cac0d8e47708d0f3e532e449a6ff1cdd563ed0c28e55bd414bde58d236064d79 │ │ └─22254 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─1157e18b55575e8c9bf2579b540506610be0f3c5a6ef48d57357352b250651de │ │ └─21873 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─6c0339ccda80e46721f5233c61ab47ec4ac6a95d2acb60da27fa91545e344d35 │ │ ├─22962 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─22979 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-13.2.2.11/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -enable-feature maybe_expr │ │ ├─22985 erl_child_setup 1048576 │ │ ├─23179 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─23180 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─23190 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/epmd -daemon │ │ └─23315 /bin/sh -s rabbit_disk_monitor │ ├─8a2d808ea9f245ad3d4be6e7c936cd4999c9c6ce2d50d7903eb70652111d35e5 │ │ └─21568 /pause │ ├─38f48ad7fdd9fc99282f387ada6064732a7729113dfc87618bd44d7cd76bc20b │ │ └─10895 /pause │ ├─6243cd8926ff8fe85b31f2a9fc95adb82275a73686a1b15806431bca9719626f │ │ └─8274 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─b382f2ca8b8aaa9dd0388c81be11ffe612406fb8d615a17696c3d0ad707b635f │ │ └─29518 /pause │ ├─5a9186f9433e206f2a70aa878ee725c9fe28f1cf12f30af9d7b4880705711d24 │ │ └─11134 /manager --metrics-bind-address=:8080 │ ├─f895e14f921f5f278122d09424126716c2a2b8206619570b749fa2ed5e5db676 │ │ └─4615 /pause │ ├─05e5d866d3375525d5a62e80e828c9ffc539bad536c7de26f8269d274bc2a03d │ │ └─22602 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─fb1ebe4443e2aa78f79b03fa9084403d7c2625edf9cd59263fb69b62e9aa51ae │ │ └─22383 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─d80b8918d45a37ab35b83aaa4af34d79a71e50e02735fec9f82435ea3b86109e │ │ └─7250 /pause │ ├─6651ff2bf86f5353f32537447d31a39a6b393649110736f4ce3199ff602213e5 │ │ └─8179 /pause │ ├─81c8532418c2d335430a69a7e716048577923dbc367037f85ca5e6a07c3315be │ │ ├─30845 apache2 -DFOREGROUND │ │ ├─33446 (wsgi:h -DFOREGROUND │ │ ├─33447 (wsgi:h -DFOREGROUND │ │ ├─33448 (wsgi:h -DFOREGROUND │ │ ├─33449 (wsgi:h -DFOREGROUND │ │ ├─33450 (wsgi:h -DFOREGROUND │ │ ├─33451 apache2 -DFOREGROUND │ │ └─33452 apache2 -DFOREGROUND │ ├─960eeb898eb92d88ce65a257e5a8ddef8a67b9379e77a51c16bf26c65bf765da │ │ └─10988 /pause │ ├─85565ff451e3f20bf0960f7abd68852804999cccf5f5dc64f510becc58110b9a │ │ └─14314 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─47e01071eeb69f09020921dd5ae7b7760ca8c9560b9f1dd9f41d318be6e63c69 │ │ └─22566 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-240.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─04aa0fe71c1fe2c2821bd7da361f100fb2a465a71a038045da5d4dba87d8d147 │ │ └─7872 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─f7ca8e166db936595e5d459118cc257ed115809fd20bdba83c8d9a79b18aa555 │ │ └─6892 /pause │ ├─3bdaa16b5643655adde091eb2473c0101a73418b5e49f167f8d29a24ca135607 │ │ └─6926 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─c66f79d457eb20e32bf79eeb94e74003f120a21f9ffa8eac1d47d1bad8670d3f │ │ ├─10302 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10314 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10402 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30544 nginx: worker process │ │ ├─30545 nginx: worker process │ │ └─30546 nginx: cache manager process │ ├─68f4e981975feb9faa3e0d0f556daaaa63320db56f31729b5d0608c8c07d922b │ │ └─22351 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-240.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─e822cc9485e966e970b507018cf38c6699095f933bb72f41848170f704ccaf99 │ │ └─22670 /bin/oauth2-proxy │ ├─c761b54c8c762ed2aecd024b3f007f35fbb80ec88a84e649e210f916b481b06b │ │ └─4606 /pause │ ├─8f545695a0b69baa87bb7786e0336f2098fde22994deb8192c86c3463fa94369 │ │ └─11611 /pause │ ├─e214d57abaca8372a1610860ef8fefbbd062135e00ac89e575fb44ee3259edb3 │ │ └─8085 /pause │ ├─d2fc705bbd11b13d53c907f6012036854c07cbf653282a8fad798bf95620ddc4 │ │ └─10024 /pause │ ├─3cccd7aacc84c6ec1cd16143340d4bb7ec80e211c11ad0931223735dad2d5276 │ │ └─21599 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─a8c623752beaef69f13a78a12627013b896a5504cd0219fd712c810c3b8ad2d3 │ │ └─20645 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─1a25b4bb540ef3a149457458cd2a0fd3a6f5b74cbab03f0040ff82f6f6a5c3e4 │ │ └─17831 /secretgen-controller │ ├─7155b78ac3a39592bf8467ca53a07cea1ebbfc8476b76cfe8c5b680f8cfabb91 │ │ ├─30922 apache2 -DFOREGROUND │ │ ├─33588 (wsgi:h -DFOREGROUND │ │ ├─33589 (wsgi:h -DFOREGROUND │ │ ├─33590 (wsgi:h -DFOREGROUND │ │ ├─33591 (wsgi:h -DFOREGROUND │ │ ├─33592 (wsgi:h -DFOREGROUND │ │ ├─33593 apache2 -DFOREGROUND │ │ └─33594 apache2 -DFOREGROUND │ ├─98b443a845726032071c5fbd6d4ec25361931ef2493ba4503ffd4b72dcce6a01 │ │ └─5854 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─484aecde5efedf7cc39784292338a7e18476a1a35a3fd4c3a3d45b0138d3a5ab │ │ └─5054 /pause │ ├─e8ba7b01a48088a66a3c94cbf908189a17d7aa5af3939509d87db9e1239ebb82 │ │ ├─26287 apache2 -DFOREGROUND │ │ ├─26318 (wsgi:k -DFOREGROUND │ │ ├─26319 (wsgi:k -DFOREGROUND │ │ ├─26320 (wsgi:k -DFOREGROUND │ │ ├─26321 (wsgi:k -DFOREGROUND │ │ ├─26324 apache2 -DFOREGROUND │ │ ├─26325 apache2 -DFOREGROUND │ │ ├─26326 apache2 -DFOREGROUND │ │ ├─26327 apache2 -DFOREGROUND │ │ ├─26329 apache2 -DFOREGROUND │ │ ├─26330 apache2 -DFOREGROUND │ │ ├─26332 apache2 -DFOREGROUND │ │ ├─26334 apache2 -DFOREGROUND │ │ ├─26336 apache2 -DFOREGROUND │ │ └─26337 apache2 -DFOREGROUND │ ├─d42d0f251a57b67a13992b17be4c47b2b620fb5c164724f106445bf78c323750 │ │ └─7339 /coredns -conf /etc/coredns/Corefile │ ├─f028c780e06c091ad1715af36ba998789f23c1d698f308f8eafb0dccdb742d44 │ │ └─29471 /pause │ ├─8aa955cc1bc1b143c76da2d91ea156047a67f3ca072737b98b61ae68a53b1f24 │ │ └─20543 /pause │ ├─85233f585ae9919683efe9462ac369f8b92d0f053f7a8c90ccc98cf4097a632b │ │ └─11911 /pause │ ├─c4a24c543ce3eb218c422339c1d8859a045142c2cc5b88c006a8c12250c6681b │ │ └─13592 /pause │ ├─d8dd3aba2cb3659c329d60a83b4d2b36d812e401a508bbd6784b2f430a9d4b19 │ │ └─7319 /coredns -conf /etc/coredns/Corefile │ ├─978e61d29bbd80cdc3fcc7cdf01b3f4320974de4b7c889f7687f197477306e3a │ │ └─10098 /pause │ ├─e1862b1e6b4f30c1c3daa6bef8a07dcd26349db95bfdb41d39dfc2dd55904a1a │ │ └─20453 /pause │ ├─d096a0d95df4dc600b067c310dff7f05c76aad91ea1cbe86c48621a4bfb661d9 │ │ └─5078 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─f204684a9c56e7bd443df3929942b51277aa9e8773c8407f10ca88181e696db6 │ │ └─4951 /kube-vip manager │ ├─c67fb072d0a275b8b803b7a60ec2be66c5b29e0d95ab37273d99bd2a94e20ba7 │ │ ├─12085 mysqld --wsrep_start_position=a5adc721-3778-11f1-980b-fb0306557772:20 │ │ └─12212 /var/lib/mysql/mysql-state-monitor │ ├─a632993794c904f999bdcf6cb6b819454b4095b567d38f560b682db58a3f1630 │ │ └─11043 /manager --metrics-bind-address=:9782 │ ├─5c04dab7adfdac3fd7e93c9ea94da22b19841fedc69ea94eaedd4b56b83aa852 │ │ └─8132 /pause │ ├─166a3701deb01ec6d4c3e33deaacbf5cc215ed411e0577dd1014276c80bff37e │ │ └─10347 /server │ ├─19523142ea1665e096fcef100969aeeac105fc78f5cd70d8b4b732fa985570b1 │ │ ├─21313 python -u /app/sidecar.py │ │ ├─21531 python -u /app/sidecar.py │ │ └─21532 python -u /app/sidecar.py │ ├─ae4e972d89ccad389da3ebb3c14c718baf1b0091999350b68ff8a20c280b2b6a │ │ └─12300 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─ef6f040dc53f25f931b3cc60e24e3ecd500a1197147865ece3a6036e4c86d247 │ │ └─22868 /bin/oauth2-proxy │ ├─816b63476a413807bed004f1feac626188effb58ddc8db0698b6001e5aae7399 │ │ ├─6153 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6487 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─5640e80f85e54d3b75f3f237164ef465f6c933d93cb045ecbf6c92144a8e79ee │ │ └─5783 /pause │ ├─c6b44b82e4064765d8cd1f02023ebca1523ca9fa0b27a1d412184a591af558f9 │ │ └─14219 /pause │ ├─c4f87f546475559daf1cfc11882b831842b23f51a86c343a0d947a77c2fb2836 │ │ └─7650 /pause │ ├─2259a88ba4c41d3b46f89b09b43122f9060dceafe8355baf62bd9cdccaeb8446 │ │ └─20499 /pause │ ├─288c9b273a4d0cdc05cd064096befbf408382d0ece373a139ec7d08ff6663b1e │ │ ├─12038 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13198 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─09b1a0828accd64c43095cd2a9326f781f14eb496c975b60f10d128afb277c0f │ │ └─29431 /pause │ ├─728c9e2ffbb132c06bda6c4be4dc63617ed657fff4a094989deec01c5c443f81 │ │ └─17805 /pause │ ├─0165760d5b13673b70cb0747e9c6f5aa1302333cf0f0474cde87c351d1cff7c2 │ │ └─22640 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─016322f77149589059968898d699c30c329f7026cc0d9c27cdfc1f1972e88460 │ │ └─4694 etcd --advertise-client-urls=https://199.19.213.240:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.240:2380 --initial-cluster=instance=https://199.19.213.240:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.240:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.240:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─b59447733898e625844fc2ef69fced0fd6884a8ebd39378bc86ad20758e678b8 │ │ └─24095 /pause │ ├─f285cd7f1f67167350a0502d747b9236c24a1ff30be3b539f7d11974e47e989a │ │ └─13981 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─f19d53921f23f29049a7dc8abc4d42ae6c31b26820a60efed74675d1147452be │ │ └─5828 /pause │ ├─c5aa54dc795c8fdd726827a851fa9e2cf590c96017ac870fd87c24dee002ff16 │ │ └─4716 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─d8fa704da6abdebd983991fe1d0d63d038dff583d12cf6d5462fd04e92696b22 │ │ └─20355 /pause │ ├─6fee37510e3d28697ff0261685a0e6dcf55a54663138ced131409e2cea996406 │ │ └─4576 /pause │ └─26ceccb0194adcf5454d517b723addd8ef11d9f39e48b508c8d236609f4a2937 │ └─21487 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount