Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─621 /lib/systemd/systemd --user │ │ └─622 (sd-pam) │ ├─session-4.scope │ │ ├─1352 sshd: zuul [priv] │ │ └─1365 sshd: zuul@notty │ └─session-1.scope │ ├─ 618 sshd: zuul [priv] │ ├─ 635 sshd: zuul@notty │ ├─ 775 /usr/bin/python3 │ ├─ 1356 ssh: /home/zuul/.ansible/cp/199.204.45.233-22-zuul [mux] │ ├─37828 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-sisapnhrebfikvbdxohjioekpmhsdssx ; /usr/bin/python3'"'"' && sleep 0' │ ├─37829 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-sisapnhrebfikvbdxohjioekpmhsdssx ; /usr/bin/python3' && sleep 0 │ ├─37830 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-sisapnhrebfikvbdxohjioekpmhsdssx ; /usr/bin/python3 │ ├─37831 /bin/sh -c echo BECOME-SUCCESS-sisapnhrebfikvbdxohjioekpmhsdssx ; /usr/bin/python3 │ ├─37832 /usr/bin/python3 │ ├─37833 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37835 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2876 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4446 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3ff72bbf7cb452508e9f9307f1949b36d3643305827551424b60b992446968c2 -address /run/containerd/containerd.sock │ │ ├─ 4471 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c21ae0ad4f164340ada9330cc0633d362f5f7461c626b42de15a97009eea1e54 -address /run/containerd/containerd.sock │ │ ├─ 4481 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b0410eebda4a870fa82ab8b2b131f30a3945c9c0f12f25b7b4657c06b6fc215f -address /run/containerd/containerd.sock │ │ ├─ 4496 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d9bee7ba20afa175cf150b0935b58a063f8ffcf66da782892b0f2e6fef5fbdbe -address /run/containerd/containerd.sock │ │ ├─ 4521 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6666597bff0025e47723c553f764f9d1f1846a44b189d5e735ecec932461f60d -address /run/containerd/containerd.sock │ │ ├─ 5029 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 062b0b0ff3c9f64556382c5bd4c603a42ea2bf53f936b7f85b23f75c698d3015 -address /run/containerd/containerd.sock │ │ ├─ 5664 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c0bd48202484b4f0119b0bb8c7823e8973e0d3d9f2387104231793fbbc403bc3 -address /run/containerd/containerd.sock │ │ ├─ 5702 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 95ef69af8f5965f48bc5589d0f9c891cfab854877c2e3bfabe4fd83ad72b1b97 -address /run/containerd/containerd.sock │ │ ├─ 6876 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a20cffe4463bbbe44f2b499e81e5509abf41173889ad80e320ff7b931a55f933 -address /run/containerd/containerd.sock │ │ ├─ 7211 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4a310ed75fe5c080ffd563a627904a8157738e210202c8562a86ac061bc059c7 -address /run/containerd/containerd.sock │ │ ├─ 7249 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f47f91881e10554ef02d38248ed493e0cf4b8bec1a9d5ebf0be9addc50eab653 -address /run/containerd/containerd.sock │ │ ├─ 7598 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2e522dba8c38bc2683c5c48e5c17f324bf15cc7eff264fb96639e9d726db553c -address /run/containerd/containerd.sock │ │ ├─ 8038 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a94241b734be958a135817cf4c2128bfada0ee3153fb66884fe65a3e683f3177 -address /run/containerd/containerd.sock │ │ ├─ 8066 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cede1fdc0a555a4bd3d869d2f4895889913a1a5679358a8bd5537e8e5b76a729 -address /run/containerd/containerd.sock │ │ ├─ 8116 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c0941e6827b1072eff236ab2f9aa7df618084bf50b6be34dae76f97797c2cccc -address /run/containerd/containerd.sock │ │ ├─10303 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 52a249849839878052919c1d571de9c24a6212892bcb124548d98cce132b5bc3 -address /run/containerd/containerd.sock │ │ ├─10356 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dacde102d34244004c5f80d0874c0a7d7580cd1213b93237839f8cb20c16bb92 -address /run/containerd/containerd.sock │ │ ├─10986 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5bd5832da37f48c7ca99f502c9f3c5255b18089a8f4828dbed8032a3b72c04c3 -address /run/containerd/containerd.sock │ │ ├─11079 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c65da77f6a799b7b6398502d256ac2092c2fed28616cba3f1cfe2bf0598a9574 -address /run/containerd/containerd.sock │ │ ├─11539 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b3180062e1435411f7696d3bce8ae8799c0680bdce56b9469a8621ed0bbcca3c -address /run/containerd/containerd.sock │ │ ├─11801 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1aaa4c66fe056a4c0882fd3af09ea2428f21003f167dfe9a7a84b4d73da71d05 -address /run/containerd/containerd.sock │ │ ├─12157 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7aa1659cc153be3c1e9a013e74e35850710f5c243d6840d088f57399764e0dbc -address /run/containerd/containerd.sock │ │ ├─13824 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8c07d38cbe90c0e7ce052428fac221b00a538e2fea749bd2e9b2a4509fd4302a -address /run/containerd/containerd.sock │ │ ├─14450 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8fea2e09f8eec7c0873e9a7504b4fe9dba103a2c476ab5267d03f668d787b225 -address /run/containerd/containerd.sock │ │ ├─17812 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 257dd1130eb8cd58f45eafedc9bb6e46dc8659a96d77dcc372cdee91836fc261 -address /run/containerd/containerd.sock │ │ ├─20326 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3caad30c8c20cf4882297776f274a4943a358fe9f34e9759c0aba9a78bfc9861 -address /run/containerd/containerd.sock │ │ ├─20430 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d1951c7b7309c0e2473dca3d577ff3dfd2125b3a6b30dd43c80a42b44fdaac8b -address /run/containerd/containerd.sock │ │ ├─20467 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 70ab38c8e801f7f721df153e148b03e3bfede2f401c0cead5d409410fb4d917c -address /run/containerd/containerd.sock │ │ ├─20509 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id df47a09571c1be8875b8cfdf8a48c4f5aeee77ccadfadb2ceff09357ca8e963f -address /run/containerd/containerd.sock │ │ ├─21599 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2036493be769720d6ef4ddbcd26822dbf770214ee7231a683987d4319f5e5bbe -address /run/containerd/containerd.sock │ │ ├─21702 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2c4c45bca626b0ef9f6b8d4a271c9df5f66df3d2aa87878885d759ee92da178d -address /run/containerd/containerd.sock │ │ ├─22492 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fefb98b8eb26e07cdf140762bf16deb9e3bcd912d57029cde39e2182c0a8be7b -address /run/containerd/containerd.sock │ │ ├─23741 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id db36734766eb585a4752add15f5e3f952d66dca19cc3fa4812a1f91524e28145 -address /run/containerd/containerd.sock │ │ ├─29266 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 102b6e0dd114cf057e3f979e2059a83a4c6268b4776c9d801e6841e950056139 -address /run/containerd/containerd.sock │ │ ├─29320 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4a64d26548ddcb0b5b77f797b2109075fd95927c98a1c74a30fd872eeb84d77f -address /run/containerd/containerd.sock │ │ └─29359 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 62f3600f5bb84269891a5c736e16468aa5be8618e1df2df96899a36c2b74cfb6 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1096 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─326 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─538 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─559 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─531 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4874 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.233 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─561 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1287 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─528 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─537 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─534 /lib/systemd/systemd-logind ├─k8s.io │ ├─db36734766eb585a4752add15f5e3f952d66dca19cc3fa4812a1f91524e28145 │ │ └─23765 /pause │ ├─8c07d38cbe90c0e7ce052428fac221b00a538e2fea749bd2e9b2a4509fd4302a │ │ └─13848 /pause │ ├─bda1693dc43bb9230ab3b5543560ec42a1e10055ce62ddd429cf1ac05f19dcac │ │ ├─12345 mysqld --wsrep_start_position=47ae9b2a-35ef-11f1-8301-ce7e730e7f85:20 │ │ └─12473 /var/lib/mysql/mysql-state-monitor │ ├─120a337f7d4672368eb672310b0d146c568ce35200aa12bdf2c1d643e5383c89 │ │ └─20646 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─62f3600f5bb84269891a5c736e16468aa5be8618e1df2df96899a36c2b74cfb6 │ │ └─29395 /pause │ ├─6666597bff0025e47723c553f764f9d1f1846a44b189d5e735ecec932461f60d │ │ └─4593 /pause │ ├─2e522dba8c38bc2683c5c48e5c17f324bf15cc7eff264fb96639e9d726db553c │ │ └─7623 /pause │ ├─c46a36c88570696a172b1ab298759fbbfe4504325a7713be9c4862fa867735a7 │ │ ├─26021 apache2 -DFOREGROUND │ │ ├─26056 (wsgi:k -DFOREGROUND │ │ ├─26057 (wsgi:k -DFOREGROUND │ │ ├─26058 (wsgi:k -DFOREGROUND │ │ ├─26059 (wsgi:k -DFOREGROUND │ │ ├─26062 apache2 -DFOREGROUND │ │ ├─26064 apache2 -DFOREGROUND │ │ ├─26067 apache2 -DFOREGROUND │ │ ├─26069 apache2 -DFOREGROUND │ │ ├─26070 apache2 -DFOREGROUND │ │ ├─26071 apache2 -DFOREGROUND │ │ ├─26072 apache2 -DFOREGROUND │ │ ├─26073 apache2 -DFOREGROUND │ │ ├─26074 apache2 -DFOREGROUND │ │ └─26075 apache2 -DFOREGROUND │ ├─df6154eb5df877a34085de2da56fe3795c1933ccf30d4a2b9ab11e49c00c89f3 │ │ └─8310 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─c21ae0ad4f164340ada9330cc0633d362f5f7461c626b42de15a97009eea1e54 │ │ └─4614 /pause │ ├─2036493be769720d6ef4ddbcd26822dbf770214ee7231a683987d4319f5e5bbe │ │ └─21623 /pause │ ├─0eec1c9d5e7ab846f9ae3afe42a7093b59a0bc417b091ec603d90fedca71f8a3 │ │ └─20828 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─fefb98b8eb26e07cdf140762bf16deb9e3bcd912d57029cde39e2182c0a8be7b │ │ └─22517 /pause │ ├─305da9da72e89ace2c01ba58aab9b5e76bc52ecc498bbaea949590bf5165fc43 │ │ ├─30656 apache2 -DFOREGROUND │ │ ├─32866 (wsgi:h -DFOREGROUND │ │ ├─32867 (wsgi:h -DFOREGROUND │ │ ├─32868 (wsgi:h -DFOREGROUND │ │ ├─32869 (wsgi:h -DFOREGROUND │ │ ├─32870 (wsgi:h -DFOREGROUND │ │ ├─32871 apache2 -DFOREGROUND │ │ └─32872 apache2 -DFOREGROUND │ ├─b3180062e1435411f7696d3bce8ae8799c0680bdce56b9469a8621ed0bbcca3c │ │ └─11563 /pause │ ├─3f88ab7219a5566ad9efe0036996d9d2ba32c03d9bb2ae08df2e0c250b3d57fb │ │ └─4826 /kube-vip manager │ ├─1d08b02c25e32bff640d55e1b71c335d34c15b823a99a415824807ff7c2fda86 │ │ ├─21276 python -u /app/sidecar.py │ │ ├─21458 python -u /app/sidecar.py │ │ └─21459 python -u /app/sidecar.py │ ├─f7d992006430885bcca3e9527d2a459db4c1f518632c93ec83a32af5f2ced57b │ │ └─7323 /coredns -conf /etc/coredns/Corefile │ ├─40f94092ebcc2f169acac9fb62d149ec79a23d21fb325a550c8b8424fc4bf8c4 │ │ ├─22939 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─22955 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-14.2.5.1/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─22961 erl_child_setup 1048576 │ │ ├─22994 sh -s disksup │ │ ├─22996 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/memsup │ │ ├─22997 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/cpu_sup │ │ ├─22999 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─23000 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─23010 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/epmd -daemon │ │ └─23083 /bin/sh -s rabbit_disk_monitor │ ├─062b0b0ff3c9f64556382c5bd4c603a42ea2bf53f936b7f85b23f75c698d3015 │ │ └─5053 /pause │ ├─192ddc53579be6fddd35ffea548d0eec96472712ff41f332eb41309f38bcb34b │ │ └─17942 /secretgen-controller │ ├─16ee4179547db8ba349f255a39ae47607c08c2e1132ccac2924f5dadbba7be89 │ │ └─4692 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─e200692f34c1580cd3a726f51ec39e70bcd7f46725fde9b41fce4ae3d5ac6e41 │ │ └─22579 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─ad361618158e48508cc976891a63260009ad6e75a07afc037dee803d2e8d151d │ │ └─14555 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─c65da77f6a799b7b6398502d256ac2092c2fed28616cba3f1cfe2bf0598a9574 │ │ └─11103 /pause │ ├─81d8d74044d7fe74f319993d0fc0bede41ddc7ddb42206f19ec7a6b6d4274a67 │ │ └─14281 /bin/memcached_exporter │ ├─d9bee7ba20afa175cf150b0935b58a063f8ffcf66da782892b0f2e6fef5fbdbe │ │ └─4617 /pause │ ├─2219766125a83830f1ab855dd163e1f3591412bb39a6e471bf1fd4f5d5385dd9 │ │ ├─31102 apache2 -DFOREGROUND │ │ ├─33057 (wsgi:h -DFOREGROUND │ │ ├─33058 (wsgi:h -DFOREGROUND │ │ ├─33059 (wsgi:h -DFOREGROUND │ │ ├─33060 (wsgi:h -DFOREGROUND │ │ ├─33061 (wsgi:h -DFOREGROUND │ │ ├─33062 apache2 -DFOREGROUND │ │ └─33063 apache2 -DFOREGROUND │ ├─dca1471a009f257e82f3e2b757e9d7211b252920c4c272d8935e7bc54608096e │ │ └─4739 kube-apiserver --advertise-address=199.204.45.233 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─a856493f1c016c64180ba6dbbd72255fbb64d848bf65702ea5601a59f4724372 │ │ ├─12299 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─14819 haproxy -sf 157 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─d936637e6356f62a06a017c3a801e618c6ec94ff848ed84cf7cc2ad3f3d65a92 │ │ └─22619 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─247ed9b528d7ecc74ed0e94b15749201093d263be0e8998734b5e00bb20ebd6a │ │ └─7304 /coredns -conf /etc/coredns/Corefile │ ├─a16ea3a31d059f2c990e90bc9f0ad49e79b28c95a7c362516e0bdf9b3d588ebe │ │ └─21434 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─73f8d6bd189c9760880d42ecbda418b02e95deb6af35bbe2874340cf1156a8af │ │ └─4701 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─b0410eebda4a870fa82ab8b2b131f30a3945c9c0f12f25b7b4657c06b6fc215f │ │ └─4607 /pause │ ├─7aa1659cc153be3c1e9a013e74e35850710f5c243d6840d088f57399764e0dbc │ │ └─12179 /pause │ ├─1dcb293b7e715386ef3d86747cefa4b5f1e5451e8156b9b83793c2ec3e2bfd05 │ │ └─12497 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─4a64d26548ddcb0b5b77f797b2109075fd95927c98a1c74a30fd872eeb84d77f │ │ └─29344 /pause │ ├─102b6e0dd114cf057e3f979e2059a83a4c6268b4776c9d801e6841e950056139 │ │ └─29298 /pause │ ├─594141b183b1838711eafcc8de3d15f0fc79087bc3cc4daeba0978b31024a824 │ │ ├─30636 apache2 -DFOREGROUND │ │ ├─32788 (wsgi:h -DFOREGROUND │ │ ├─32789 (wsgi:h -DFOREGROUND │ │ ├─32790 (wsgi:h -DFOREGROUND │ │ ├─32791 (wsgi:h -DFOREGROUND │ │ ├─32792 (wsgi:h -DFOREGROUND │ │ ├─32793 apache2 -DFOREGROUND │ │ └─32794 apache2 -DFOREGROUND │ ├─5bfac60556805bccb37e8aa84fad5129803e0a7b362fe1c0bf88e7425dce69f9 │ │ └─5940 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─c0941e6827b1072eff236ab2f9aa7df618084bf50b6be34dae76f97797c2cccc │ │ └─8140 /pause │ ├─257dd1130eb8cd58f45eafedc9bb6e46dc8659a96d77dcc372cdee91836fc261 │ │ └─17835 /pause │ ├─c0bd48202484b4f0119b0bb8c7823e8973e0d3d9f2387104231793fbbc403bc3 │ │ └─5690 /pause │ ├─3ff72bbf7cb452508e9f9307f1949b36d3643305827551424b60b992446968c2 │ │ └─4562 /pause │ ├─52a249849839878052919c1d571de9c24a6212892bcb124548d98cce132b5bc3 │ │ └─10330 /pause │ ├─848118eabf2f23d31732b36b5dbba1f376dd76f4f045bb97d6bf956f7e305603 │ │ └─7743 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─68af241ce32fc191e09b020b17812586730cdd2afc8a7ff91ca21f9f87338511 │ │ └─12445 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─0cd1ca1dc25ec0b7b406c5a37347721ea539377a01cad7011f19dc649b40f360 │ │ └─22804 /bin/oauth2-proxy │ ├─2c4c45bca626b0ef9f6b8d4a271c9df5f66df3d2aa87878885d759ee92da178d │ │ └─21726 /pause │ ├─e80206291aa2b0277d90378bd6ba2a14e701757f3950979b69dc57d01c92df6f │ │ └─14231 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─4e743b09c87fa6dffb99c8a43693a512ccdd72a56131da840623a05fdf708e50 │ │ └─22290 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-233.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─a20cffe4463bbbe44f2b499e81e5509abf41173889ad80e320ff7b931a55f933 │ │ └─6900 /pause │ ├─3be78aecb5530942d7a6d9586acb91118b45c512fe860a932201a350a443215b │ │ └─11688 percona-xtradb-cluster-operator │ ├─3e6c1e92630b48aabcca9340d7a4e1faf3dcefb1a6c3ca145228bbd1952420f9 │ │ └─22664 /bin/oauth2-proxy │ ├─5bd5832da37f48c7ca99f502c9f3c5255b18089a8f4828dbed8032a3b72c04c3 │ │ └─11010 /pause │ ├─dacde102d34244004c5f80d0874c0a7d7580cd1213b93237839f8cb20c16bb92 │ │ └─10379 /pause │ ├─b452cd14d547d0a39fbb94a1d522d7f4fd2d6bf163095ab00d887ca977bc8467 │ │ └─4730 etcd --advertise-client-urls=https://199.204.45.233:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.233:2380 --initial-cluster=instance=https://199.204.45.233:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.233:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.233:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─fb37d2ceb4cd85a30152029ba910f647305e223349b7895da05fda85fc0aa8c2 │ │ ├─10579 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10593 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10715 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30389 nginx: worker process │ │ ├─30390 nginx: worker process │ │ └─30391 nginx: cache manager process │ ├─4d93f1de497e416ef1af9a15b6375a97192550f6cf7d3faf7aadbab5117d17df │ │ └─22325 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─f47f91881e10554ef02d38248ed493e0cf4b8bec1a9d5ebf0be9addc50eab653 │ │ └─7272 /pause │ ├─cede1fdc0a555a4bd3d869d2f4895889913a1a5679358a8bd5537e8e5b76a729 │ │ └─8102 /pause │ ├─e8ced47356f40e3933364d5c7b6e73f0397965f537296d2011ef751d30a13c6f │ │ ├─6143 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6502 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─df47a09571c1be8875b8cfdf8a48c4f5aeee77ccadfadb2ceff09357ca8e963f │ │ └─20536 /pause │ ├─95ef69af8f5965f48bc5589d0f9c891cfab854877c2e3bfabe4fd83ad72b1b97 │ │ └─5733 /pause │ ├─e0773866d79dcfd9ed606d0b4fb7f6776e6288b582b80bf38e2387ec022e4970 │ │ └─22721 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─b2827a303c81e9f5a9328d1a5e0d0089d11bc37fcb52be962d0a86976e19834d │ │ └─22546 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-233.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─68f8203e9b9026ac09331e7f4fa42c5b599c4ed69da27c4a89b0b92a12fca05c │ │ └─21815 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─1aaa4c66fe056a4c0882fd3af09ea2428f21003f167dfe9a7a84b4d73da71d05 │ │ └─11825 /pause │ ├─70ab38c8e801f7f721df153e148b03e3bfede2f401c0cead5d409410fb4d917c │ │ └─20490 /pause │ ├─c3b7733bbf9962b051920e7a5bff3aab67ddaea0e8912c12d236b80142b63212 │ │ ├─21249 python -u /app/sidecar.py │ │ ├─21447 python -u /app/sidecar.py │ │ └─21448 python -u /app/sidecar.py │ ├─4a310ed75fe5c080ffd563a627904a8157738e210202c8562a86ac061bc059c7 │ │ └─7239 /pause │ ├─fe861965e198445c873c52e3058dbc2bfda66f984eab977e9538879ab7438eae │ │ └─5077 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─f52ca102c6884e1b286d6cf35fbc8d3723a9fb458db8fb3004af287d9a1cb3b9 │ │ └─8272 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─d1951c7b7309c0e2473dca3d577ff3dfd2125b3a6b30dd43c80a42b44fdaac8b │ │ └─20454 /pause │ ├─376f96baee3ea724e9f7467d0be5003839acb8d93689bd8e9bd59e51d917c371 │ │ └─8348 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─07ff9a3295ba7d29d8f59e851272918e61b8f07a834dce2a7355f9381901c79b │ │ └─11260 /manager --metrics-bind-address=:9782 │ ├─eab968fcce8ab3da697952d7548e4e5e4666797c5638292120cf3587ab37e58c │ │ └─6948 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─a94241b734be958a135817cf4c2128bfada0ee3153fb66884fe65a3e683f3177 │ │ └─8082 /pause │ ├─8fea2e09f8eec7c0873e9a7504b4fe9dba103a2c476ab5267d03f668d787b225 │ │ └─14474 /pause │ ├─21b815b9f0ecc52eba228e5f5e77790b8f36d99d2cf90d42b112f17f69275caf │ │ └─11413 /manager --metrics-bind-address=:8080 │ ├─3caad30c8c20cf4882297776f274a4943a358fe9f34e9759c0aba9a78bfc9861 │ │ └─20356 /pause │ └─cf4e915b3a32c789398ecf245381d596e580cfdae684ead87ea6b29a24b4d614 │ └─10627 /server ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount