Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─624 /lib/systemd/systemd --user │ │ └─625 (sd-pam) │ ├─session-4.scope │ │ ├─1367 sshd: zuul [priv] │ │ └─1380 sshd: zuul@notty │ └─session-1.scope │ ├─ 621 sshd: zuul [priv] │ ├─ 638 sshd: zuul@notty │ ├─ 775 /usr/bin/python3 │ ├─ 1371 ssh: /home/zuul/.ansible/cp/199.204.45.113-22-zuul [mux] │ ├─21686 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-mrillaqfdwoksmaplfakutemiqvwkbxb ; /usr/bin/python3'"'"' && sleep 0' │ ├─21691 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-mrillaqfdwoksmaplfakutemiqvwkbxb ; /usr/bin/python3' && sleep 0 │ ├─21692 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-mrillaqfdwoksmaplfakutemiqvwkbxb ; /usr/bin/python3 │ ├─21693 /bin/sh -c echo BECOME-SUCCESS-mrillaqfdwoksmaplfakutemiqvwkbxb ; /usr/bin/python3 │ ├─21694 /usr/bin/python3 │ ├─21697 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─21699 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2888 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4448 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c5df3d32175112d38caaf028d6077155fee5792b999b11a44f277606f73783ab -address /run/containerd/containerd.sock │ │ ├─ 4457 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 978a951d97648940ca93a3ccb5ff5cbafb5a49105ba04d3099078393b7f80fbf -address /run/containerd/containerd.sock │ │ ├─ 4496 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id db949bb47c31f63e9e3669752e3c439d29cdc6bc3fdfa16e038f0c2e6d07126e -address /run/containerd/containerd.sock │ │ ├─ 4502 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 36525d77cd5efd96459e2a94067d7bac490971dc33a6eb11367376c1c1c43e2c -address /run/containerd/containerd.sock │ │ ├─ 4518 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7f7db3c2048dc11a2036b0d36fc2d181e617af9e93e8290b765aa2881dd12506 -address /run/containerd/containerd.sock │ │ ├─ 5009 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5a380994a6419e5057f9a1488deaaa39e174dcd4632ba9cf3321b3cf99f04768 -address /run/containerd/containerd.sock │ │ ├─ 5666 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c7e199edb2dc2bb08f5e1846039390941198d99737e8082ac93dd012e47bef11 -address /run/containerd/containerd.sock │ │ ├─ 5681 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a8842ea4bd325195a74d7068bab01b687bc862627b3a57e8240549fe045e76b6 -address /run/containerd/containerd.sock │ │ ├─ 6991 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a609d5da9125bbf9fb25879aafe901442c98a7e8d5b03119c045d86a9683d381 -address /run/containerd/containerd.sock │ │ ├─ 7337 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 337500a3556011da4c4c83ef71cfa5e2d1ddbc1fe6314ee3a7b50ac9c6d503b8 -address /run/containerd/containerd.sock │ │ ├─ 7381 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2c9cef4381052dfc8227937b55f73e46cc28df18058d428fce40d1f61b0397d4 -address /run/containerd/containerd.sock │ │ ├─ 7784 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 059dd714cd86f35298ad97544e487986c77e50cedde714ba36270c7c7f154e74 -address /run/containerd/containerd.sock │ │ ├─ 8252 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7c7c427ad11eb3d783aaeebe5d45bb9416dfe763311db7e3b4a781528610a67b -address /run/containerd/containerd.sock │ │ ├─ 8291 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ae9b162206e732d323f130d48f30f840689c2bdd6b2fc7396cbf27bfd13391cd -address /run/containerd/containerd.sock │ │ ├─ 8368 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9e39500e6fa48543e6ba009d72605be3c2ece7d7ace75b158f97e7e5c38f5d6a -address /run/containerd/containerd.sock │ │ ├─10444 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 31e35f9233da44f50d8150e5062e063f94ab4e554c046ed3706092f9b8443996 -address /run/containerd/containerd.sock │ │ ├─10502 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d2bcb6750260336d4605e65cbd8d5941bc659bbaf00b39b09e351839f8a4fd56 -address /run/containerd/containerd.sock │ │ ├─11153 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1817fa390ea88a232fcd782d45c8ec1e85ae67737664633a187380445759c965 -address /run/containerd/containerd.sock │ │ ├─11202 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cf0ba62636ac3febdf28ee7eef35715114e981dde82d05736803101085d83fff -address /run/containerd/containerd.sock │ │ ├─11684 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e3a9e831b737748a5fc07de51c24b7a8f15e875da9c1fc278cbe7d2bf7110110 -address /run/containerd/containerd.sock │ │ ├─11942 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c22dc248e343e8ff44d96c493727ac1247521c3d15939fad153ce63c047770ca -address /run/containerd/containerd.sock │ │ ├─12315 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 331379014b159a22b4e1d0dbddd9d9b5bdeab38e7c708014e1d453ef9deeaa01 -address /run/containerd/containerd.sock │ │ ├─13892 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c70670865a35dc733caea56f9149b4e6fa5be89290c904fb58e5efd70d161343 -address /run/containerd/containerd.sock │ │ ├─14526 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ed242f48d531c67f0ba4108adf80e6f2f6d50cf53362362c96f12a8558052084 -address /run/containerd/containerd.sock │ │ ├─17853 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2a66fa2a97eaf35eb54206a9559927e5454e2511bb2db44de88446d092566482 -address /run/containerd/containerd.sock │ │ ├─20225 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f6a56646bd441eda52a83f2e224f02a8e3c5fa53e3d2794147f0ca0405ec2c3e -address /run/containerd/containerd.sock │ │ ├─20342 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 00bc617ccfa0bf01fd606a0a87b45c422ecd0560e6c59de8819e376bef432527 -address /run/containerd/containerd.sock │ │ ├─20385 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3b2e4a8d9bc2061f935f6b4612b6a059be9ac510059fd0564ac7e530164e29a0 -address /run/containerd/containerd.sock │ │ ├─20436 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6e7b1bf03994007b6555ce7dc50e9bc249efda5a7d66ce16af9f3ea197c63073 -address /run/containerd/containerd.sock │ │ ├─21459 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 96c390fb9784b20f284920d39d62917ba6258097c0d09c69466203c9d13ea748 -address /run/containerd/containerd.sock │ │ └─21534 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7165bedae0493a0fa67d850144fc22f908a8f844436a22f436b63cb59f17d457 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1098 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─439 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─546 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─565 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─535 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4877 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.113 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─295 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─567 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1302 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─545 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─5792337d16a5e7afad6cd90689f309daba96ac1135c93eb9c6206fdecf9239bd │ │ └─12438 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─3e4afcfc2ac52852874db7582b01679ffc8dcc222a47a3ef71962a4f0286810a │ │ ├─6246 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6581 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─54dc0dfa69d8495494618364290a9e2b2fd6d65ce09fd83c1db0e8affb98d498 │ │ ├─21101 python -u /app/sidecar.py │ │ ├─21357 python -u /app/sidecar.py │ │ └─21358 python -u /app/sidecar.py │ ├─d2bcb6750260336d4605e65cbd8d5941bc659bbaf00b39b09e351839f8a4fd56 │ │ └─10527 /pause │ ├─331379014b159a22b4e1d0dbddd9d9b5bdeab38e7c708014e1d453ef9deeaa01 │ │ └─12340 /pause │ ├─978a951d97648940ca93a3ccb5ff5cbafb5a49105ba04d3099078393b7f80fbf │ │ └─4556 /pause │ ├─e3a9e831b737748a5fc07de51c24b7a8f15e875da9c1fc278cbe7d2bf7110110 │ │ └─11709 /pause │ ├─ae9b162206e732d323f130d48f30f840689c2bdd6b2fc7396cbf27bfd13391cd │ │ └─8329 /pause │ ├─660b5e0582f349436647ca936803a466dceeee82a21dce0edba73a82714c1984 │ │ └─5059 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─ed242f48d531c67f0ba4108adf80e6f2f6d50cf53362362c96f12a8558052084 │ │ └─14551 /pause │ ├─f6a56646bd441eda52a83f2e224f02a8e3c5fa53e3d2794147f0ca0405ec2c3e │ │ └─20266 /pause │ ├─7c7c427ad11eb3d783aaeebe5d45bb9416dfe763311db7e3b4a781528610a67b │ │ └─8275 /pause │ ├─31e35f9233da44f50d8150e5062e063f94ab4e554c046ed3706092f9b8443996 │ │ └─10474 /pause │ ├─99312631a3424f11a87be1d0c1af52eec64b8e660a913ffe9ea80efc868196bd │ │ └─8530 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─7f7db3c2048dc11a2036b0d36fc2d181e617af9e93e8290b765aa2881dd12506 │ │ └─4608 /pause │ ├─cf0ba62636ac3febdf28ee7eef35715114e981dde82d05736803101085d83fff │ │ └─11226 /pause │ ├─2c9cef4381052dfc8227937b55f73e46cc28df18058d428fce40d1f61b0397d4 │ │ └─7404 /pause │ ├─0b432d300eeb2c64394863af02bb5a9c0ed4a4c2211aadb4278abf575785dc23 │ │ └─21386 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─6cc119141de285451c0c1be70ad71a0d103be647da5e9a36ffad0ab57bda9750 │ │ └─14637 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─059dd714cd86f35298ad97544e487986c77e50cedde714ba36270c7c7f154e74 │ │ └─7809 /pause │ ├─7fbb1a5cb71b71f2271415199fd0785e627d700e99100263c161128da8a2d515 │ │ └─11399 /manager --metrics-bind-address=:8080 │ ├─a9b70a255c24301139505a34fbf706af534078ac146e01a98e2f7eb4b0b4c843 │ │ └─14497 /bin/memcached_exporter │ ├─32cc4e8a3ab85ec6489297f45290f89854ec0e68a0db26ca71e5fcea7b8773cd │ │ └─8002 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─c70670865a35dc733caea56f9149b4e6fa5be89290c904fb58e5efd70d161343 │ │ └─13916 /pause │ ├─4218279e81ff61706a8347937a351ad6743797d5d4268cd3a48278b69d6b373d │ │ └─8452 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─00bc617ccfa0bf01fd606a0a87b45c422ecd0560e6c59de8819e376bef432527 │ │ └─20363 /pause │ ├─a8842ea4bd325195a74d7068bab01b687bc862627b3a57e8240549fe045e76b6 │ │ └─5725 /pause │ ├─74d3c2cc8aa3f9a671770266e3d41ef355432f992118c8709fd1ff603919334c │ │ ├─12513 mysqld --wsrep_start_position=8b7ab686-3280-11f1-999e-7bf38474ebe4:20 │ │ └─12636 /var/lib/mysql/mysql-state-monitor │ ├─336012ea89b0fbfffa5bb70db3f98e9a5a003dc9527df4464c78f43291dab60e │ │ └─17952 /secretgen-controller │ ├─337500a3556011da4c4c83ef71cfa5e2d1ddbc1fe6314ee3a7b50ac9c6d503b8 │ │ └─7361 /pause │ ├─1817fa390ea88a232fcd782d45c8ec1e85ae67737664633a187380445759c965 │ │ └─11177 /pause │ ├─c7e199edb2dc2bb08f5e1846039390941198d99737e8082ac93dd012e47bef11 │ │ └─5709 /pause │ ├─c5df3d32175112d38caaf028d6077155fee5792b999b11a44f277606f73783ab │ │ └─4537 /pause │ ├─6e7b1bf03994007b6555ce7dc50e9bc249efda5a7d66ce16af9f3ea197c63073 │ │ └─20459 /pause │ ├─4c4583c2dda0b34ee2c20c05bedaf2386c4537f1e15734d6978c059baca16a13 │ │ └─21140 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─c6bcb945691eb47d96233549bf7bea453b70c1df1c89227a7cc21b25ce85ae8a │ │ └─4695 etcd --advertise-client-urls=https://199.204.45.113:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.113:2380 --initial-cluster=instance=https://199.204.45.113:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.113:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.113:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─a5bcbaf60e56ea3167c08c4f95bc9e2be49c29c93017b356ebf52e3556ccc017 │ │ ├─10729 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10741 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10870 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─20714 nginx: worker process │ │ ├─20716 nginx: worker process │ │ └─20717 nginx: cache manager process │ ├─0b7d351979405865747b1b3acd65571e1072ff9d442707ad452cc253610dd61e │ │ └─8490 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─b2193ace84c5939716584a9adbdf3e803662d36593e742a37f2aaafb5b38c661 │ │ └─4829 /kube-vip manager │ ├─9e39500e6fa48543e6ba009d72605be3c2ece7d7ace75b158f97e7e5c38f5d6a │ │ └─8392 /pause │ ├─7165bedae0493a0fa67d850144fc22f908a8f844436a22f436b63cb59f17d457 │ │ └─21579 /pause │ ├─3b2e4a8d9bc2061f935f6b4612b6a059be9ac510059fd0564ac7e530164e29a0 │ │ └─20415 /pause │ ├─5a380994a6419e5057f9a1488deaaa39e174dcd4632ba9cf3321b3cf99f04768 │ │ └─5034 /pause │ ├─c2af16b50c2be015458ba384bff53c4b683d82b888643dc1f7d321482310e169 │ │ └─4691 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─a609d5da9125bbf9fb25879aafe901442c98a7e8d5b03119c045d86a9683d381 │ │ └─7015 /pause │ ├─7c0c9711baf7ea20dd6204bd2439b43d991a0148f8fb04b56350b4eb31242e9f │ │ └─20652 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─83f90f4cd60d7a4e619985187785835a2fdbecb2fd04b7b842699f488562a62e │ │ └─14415 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─96c390fb9784b20f284920d39d62917ba6258097c0d09c69466203c9d13ea748 │ │ └─21484 /pause │ ├─d13e753ea0da0e102c4a6effc61743fdb160052b74f16840a61098e0a6931043 │ │ ├─21075 python -u /app/sidecar.py │ │ ├─21355 python -u /app/sidecar.py │ │ └─21356 python -u /app/sidecar.py │ ├─783eca4acef446d9d6a3d44dba82b89e6210249760b32aa8c64fe847d8065a23 │ │ ├─12365 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13536 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─db949bb47c31f63e9e3669752e3c439d29cdc6bc3fdfa16e038f0c2e6d07126e │ │ └─4587 /pause │ ├─109b703d6a50e24900ab2104c49ef68b581d28cfb9ddd1054795ca1a4e7b645a │ │ └─4741 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─c22dc248e343e8ff44d96c493727ac1247521c3d15939fad153ce63c047770ca │ │ └─11966 /pause │ ├─137b860f70be5427159dbcc25370b4f707e153be15962b017976028c537c6dce │ │ └─11828 percona-xtradb-cluster-operator │ ├─308101286843399279e3b678f84473663edd30b44424b11d040d20e7f921c89c │ │ └─12611 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─c3bd3ecd739c837ef7b9f15f8630466b25954c193f6acf8b4642078e8ef5ae5e │ │ └─7431 /coredns -conf /etc/coredns/Corefile │ ├─36525d77cd5efd96459e2a94067d7bac490971dc33a6eb11367376c1c1c43e2c │ │ └─4616 /pause │ ├─f0566a451f18171812ee7e666a7fd8f0c25f34902f9a79887c89ddead8e7469b │ │ └─7473 /coredns -conf /etc/coredns/Corefile │ ├─4b9db14f4d6fb99c8bce54ff73b9203d0789104ed01ff05b2bf95a3fd80a8583 │ │ └─6042 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─747c2ca569aaa90b8de043d6ef866e94dfa1fb129a23d24872edab7db1e80685 │ │ └─7042 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─5cc47c4b7262206ddf7b946b5670d426f9a42d8162b5c2a8212ad09081530267 │ │ └─11294 /manager --metrics-bind-address=:9782 │ ├─b13cd50ffee6a191a04ad58081c11962ac83a128cc299456f78a13884749de84 │ │ └─10772 /server │ ├─2a66fa2a97eaf35eb54206a9559927e5454e2511bb2db44de88446d092566482 │ │ └─17876 /pause │ └─15bf0027b4fa1d62bb65160c9a9c60c24b1c41d7190b2fad9f95b2d32d93f1fa │ └─4721 kube-apiserver --advertise-address=199.204.45.113 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount