Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─614 /lib/systemd/systemd --user │ │ └─615 (sd-pam) │ ├─session-4.scope │ │ ├─1349 sshd: zuul [priv] │ │ └─1362 sshd: zuul@notty │ └─session-1.scope │ ├─ 611 sshd: zuul [priv] │ ├─ 628 sshd: zuul@notty │ ├─ 765 /usr/bin/python3 │ ├─ 1353 ssh: /home/zuul/.ansible/cp/199.19.213.206-22-zuul [mux] │ ├─38044 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-euaeqdhbrpmqjsplbrzjehxfhwhtmhce ; /usr/bin/python3'"'"' && sleep 0' │ ├─38045 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-euaeqdhbrpmqjsplbrzjehxfhwhtmhce ; /usr/bin/python3' && sleep 0 │ ├─38046 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-euaeqdhbrpmqjsplbrzjehxfhwhtmhce ; /usr/bin/python3 │ ├─38047 /bin/sh -c echo BECOME-SUCCESS-euaeqdhbrpmqjsplbrzjehxfhwhtmhce ; /usr/bin/python3 │ ├─38048 /usr/bin/python3 │ ├─38051 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38053 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2871 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4436 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6ecbf388052c2ff08767f426dd6b1e89a913f8bf22bfd06215d98f4142f944db -address /run/containerd/containerd.sock │ │ ├─ 4443 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 503a941acd2c37960d474941ebd88f3cce426eb1863aa2f4326bef93e641d9c0 -address /run/containerd/containerd.sock │ │ ├─ 4469 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f834590edea7f4be29d59a9f447117eb837a4ca60f71e45488526b27196b6b80 -address /run/containerd/containerd.sock │ │ ├─ 4479 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b42e5adaff36578555474d706a00291abff4fc70fe8d65e7356fdfd230af256a -address /run/containerd/containerd.sock │ │ ├─ 4517 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1481e8078a9d5f1c67ef8b1ab0a267ebb27d2b4e06db1974bf13b553d50bfef0 -address /run/containerd/containerd.sock │ │ ├─ 4997 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 21732fb6703d2ad5987afc3163bf7b6bb02be3b057844128ed2c618c8968bb0f -address /run/containerd/containerd.sock │ │ ├─ 5650 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c6e8e636989a115c1be15ed40013db36feb0c1941e9ebaba479c892a8172d38c -address /run/containerd/containerd.sock │ │ ├─ 5675 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1396d06b75521acd09c0f8a6043af4fd0f48bf20164463ced251c27d7e28906c -address /run/containerd/containerd.sock │ │ ├─ 7055 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6b92b3766d113d94b0bd1b3d9484bf97a592ffe53a67369e98d08a42da78b087 -address /run/containerd/containerd.sock │ │ ├─ 7405 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2173a8806d6ba3bc292603363784deb3b497bf3b148dbcea02a480de16b229dc -address /run/containerd/containerd.sock │ │ ├─ 7428 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ab1b2e6fa032fe2ad6e2691b683a1700267f4cfbcdcde5307f0f24b00760251b -address /run/containerd/containerd.sock │ │ ├─ 7795 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7c0936b80668fa1718475dd66db02725e239897fca798cdfe4dc4451f5522b19 -address /run/containerd/containerd.sock │ │ ├─ 8289 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8f3415c64231872b749280c0a2c8ffcd414c2394eb708d79df99bfa4ce2289a7 -address /run/containerd/containerd.sock │ │ ├─ 8327 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 13de0220316207feacb784769a7b738f31ec509991e6c3b22fb80029fa56642d -address /run/containerd/containerd.sock │ │ ├─ 8366 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 38d078acf0845a0a0a60c2ac46c9fc06bf69b1c1985885ae34560a2a8c07f9e0 -address /run/containerd/containerd.sock │ │ ├─10225 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c35929ada8662c8840af193be6d29fe4d7daaa141948ac98188b55e82621e739 -address /run/containerd/containerd.sock │ │ ├─10296 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 94445fedc813d74803fb4fb57892438d6a1081116b8b7a506b190bb170df12e0 -address /run/containerd/containerd.sock │ │ ├─10943 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b78d5f0b0a2a12336f55d562f51f1e11cb7bdfc521145508f349506388710916 -address /run/containerd/containerd.sock │ │ ├─10979 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 062c42dce113a22abbe5dd187f956d453229db88947724f212b8bafd8235ecbd -address /run/containerd/containerd.sock │ │ ├─11316 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a760af5e8c09804692de4aa5d7d02a7c3863caec06045113e653afeb144f6c55 -address /run/containerd/containerd.sock │ │ ├─11767 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id abcaf0b78fb756bc6213274510223e3a0889794f9c4a77ca6a5fb2d81fa65ea8 -address /run/containerd/containerd.sock │ │ ├─12041 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 542cfa9f5cfc0fa8abc848ce3eb318ea2ab4c3dc3c2737d86ff167a595c4a897 -address /run/containerd/containerd.sock │ │ ├─13769 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d7bc7872098ac2dfab93e00acf8b9ac7b1606e374b656ab043ceeab8f54a84a6 -address /run/containerd/containerd.sock │ │ ├─14432 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 746c2052709f70d3fb223d9c6c8fbf23a1f36b376607959b24e24f3476e61bbb -address /run/containerd/containerd.sock │ │ ├─17954 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c705b4e16348e9a9ce8e3cd61d34f85e72f4a4e6e07e05f969d71ba283d921b3 -address /run/containerd/containerd.sock │ │ ├─20457 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 929713037f69ff54351a5682271240c5a313fff0f67f2061ff6ba6cfd66ff133 -address /run/containerd/containerd.sock │ │ ├─20572 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b940b21362cef5af58fdc7aede55b4401738d1fef2147884eeb9e9ec150ee623 -address /run/containerd/containerd.sock │ │ ├─20612 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 02c930674e515329fc3ef4693f5c9e3fec452bd3ad32dbb3be8963a52152da17 -address /run/containerd/containerd.sock │ │ ├─20657 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 645fb1c69a3ed9b0626339bb49b0795afaa086f4e74fc33caae3dded82d0240c -address /run/containerd/containerd.sock │ │ ├─21644 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 10e3b0d1198fae90bfb655f3e1c38700e88158c111620b809cec2f82883d4742 -address /run/containerd/containerd.sock │ │ ├─21699 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 43ad9a8977252ccebd00db85b49f28b09a74d87ff6f423fa819be04a8b47c6cc -address /run/containerd/containerd.sock │ │ ├─22487 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1112ff4f943a9265276e167579b72bea05fb3762c5d75d7d93d78e0a5e68d852 -address /run/containerd/containerd.sock │ │ ├─24142 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b26335d090a1ab7e3070f902be8aa862c6ee2145b7ca503da2bab9f30c52038 -address /run/containerd/containerd.sock │ │ ├─29524 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eb7f7e716411711ff44c91601b094fe3ec5e1c912d3448739790578e57e2a718 -address /run/containerd/containerd.sock │ │ ├─29566 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 833d661f350149245587d6a95e8c7134da749a1b7fe6bf52c95101eaa883a3e3 -address /run/containerd/containerd.sock │ │ └─29650 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6ab227fa85449be5ec733fcc5a845b7880a77d663c92099c0471a9f1a587415e -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1088 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─436 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─326 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─541 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─555 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─531 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4866 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.206 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─294 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─557 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1284 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─329 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─528 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─330 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─539 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─534 /lib/systemd/systemd-logind ├─k8s.io │ ├─708402a29dc0375f2b9644f6eb01a76258762a070540645de19ce507893508f8 │ │ └─4712 etcd --advertise-client-urls=https://199.19.213.206:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.206:2380 --initial-cluster=instance=https://199.19.213.206:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.206:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.206:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─abcaf0b78fb756bc6213274510223e3a0889794f9c4a77ca6a5fb2d81fa65ea8 │ │ └─11790 /pause │ ├─f1aebcc2230e819b13146ec82b30542bb910c2b4c12397d2f701a02dd4a5a648 │ │ └─14540 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─c06681fae6ba2ef1fd158e64a084a20a6bbc7ae6cc1efa9000c53d65924c8355 │ │ ├─21560 python -u /app/sidecar.py │ │ ├─21804 python -u /app/sidecar.py │ │ └─21805 python -u /app/sidecar.py │ ├─7c0936b80668fa1718475dd66db02725e239897fca798cdfe4dc4451f5522b19 │ │ └─7820 /pause │ ├─6ecbf388052c2ff08767f426dd6b1e89a913f8bf22bfd06215d98f4142f944db │ │ └─4563 /pause │ ├─39d4c5e3fe52a555b56ce631ced9a5de6f92b1226956551553f1599f92707ccd │ │ └─7501 /coredns -conf /etc/coredns/Corefile │ ├─dd7cf59c005cdd474d5842e87d5fc5c20b39a7bdb5c70218e77b387229f480ed │ │ └─11080 /manager --metrics-bind-address=:9782 │ ├─b6b0d62165d5ee1468a72e93882d9e0a154fcf41fe77c2a45f511528d2588a9d │ │ └─12462 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─645fb1c69a3ed9b0626339bb49b0795afaa086f4e74fc33caae3dded82d0240c │ │ └─20680 /pause │ ├─0761f3ad4e3b27a31cbbc44f89e95965c312d1e7d758499b07dbd3073a271244 │ │ └─18027 /secretgen-controller │ ├─4dc2880d819fb1993ac32ee2ced44b8d726b25389af06e0b77a098c82dddf815 │ │ └─22653 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─c705b4e16348e9a9ce8e3cd61d34f85e72f4a4e6e07e05f969d71ba283d921b3 │ │ └─17978 /pause │ ├─6ab227fa85449be5ec733fcc5a845b7880a77d663c92099c0471a9f1a587415e │ │ └─29717 /pause │ ├─38d078acf0845a0a0a60c2ac46c9fc06bf69b1c1985885ae34560a2a8c07f9e0 │ │ └─8392 /pause │ ├─eb7f7e716411711ff44c91601b094fe3ec5e1c912d3448739790578e57e2a718 │ │ └─29551 /pause │ ├─84896933611dc2717c59eba1f48b6bee94d61a60b45f1d7bddc871909f556f6a │ │ └─11459 percona-xtradb-cluster-operator │ ├─90d618cea79cdb874db0b198b0378d45c511d7c3c25c36928fc79b113a6b1e73 │ │ ├─21532 python -u /app/sidecar.py │ │ ├─21802 python -u /app/sidecar.py │ │ └─21803 python -u /app/sidecar.py │ ├─c8a9c83e7ff1c0595deca602cbd15208b5a44d58b935580b1fa8728f9c5913b8 │ │ └─22742 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─746c2052709f70d3fb223d9c6c8fbf23a1f36b376607959b24e24f3476e61bbb │ │ └─14457 /pause │ ├─4057805b8b52adf7fd31d218e268eefad1de31d6b604b8b50e7352c956cfb3ec │ │ ├─26654 apache2 -DFOREGROUND │ │ ├─26697 (wsgi:k -DFOREGROUND │ │ ├─26698 (wsgi:k -DFOREGROUND │ │ ├─26699 (wsgi:k -DFOREGROUND │ │ ├─26700 (wsgi:k -DFOREGROUND │ │ ├─26705 apache2 -DFOREGROUND │ │ ├─26706 apache2 -DFOREGROUND │ │ ├─26709 apache2 -DFOREGROUND │ │ ├─26710 apache2 -DFOREGROUND │ │ ├─26711 apache2 -DFOREGROUND │ │ ├─26712 apache2 -DFOREGROUND │ │ ├─26713 apache2 -DFOREGROUND │ │ ├─26714 apache2 -DFOREGROUND │ │ ├─26715 apache2 -DFOREGROUND │ │ └─26716 apache2 -DFOREGROUND │ ├─4100eebe2bea0567de84c7d7549f2bdd32154d0017227916bec56d539197b9c7 │ │ └─22708 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-206.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─fccfbf57e93a50ea766cef9179e180bd14d8fe71968ea9e10019a27dcc13f45b │ │ └─4688 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─10e3b0d1198fae90bfb655f3e1c38700e88158c111620b809cec2f82883d4742 │ │ └─21671 /pause │ ├─5fa501d82e48592d3bcbe83952c3d12f5d968ec8713d12fcac23a3c49f1574c9 │ │ └─7115 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─c6e8e636989a115c1be15ed40013db36feb0c1941e9ebaba479c892a8172d38c │ │ └─5688 /pause │ ├─6b92b3766d113d94b0bd1b3d9484bf97a592ffe53a67369e98d08a42da78b087 │ │ └─7079 /pause │ ├─db1d190530e798ab41c211deb35604da1dc0ba1c3e53aa44f7ce7e0cbbcabe2f │ │ └─8582 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─9cc241fec821cff9a7e5af70177107120a5d69a75345981767d805ba70a87cfa │ │ └─6137 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─062c42dce113a22abbe5dd187f956d453229db88947724f212b8bafd8235ecbd │ │ └─11006 /pause │ ├─43ad9a8977252ccebd00db85b49f28b09a74d87ff6f423fa819be04a8b47c6cc │ │ └─21722 /pause │ ├─f01632ff622cbfa4c45b1e3c347e1ce058557f05da8c0f8c73776d710b35e41c │ │ ├─30944 apache2 -DFOREGROUND │ │ ├─33348 (wsgi:h -DFOREGROUND │ │ ├─33349 (wsgi:h -DFOREGROUND │ │ ├─33350 (wsgi:h -DFOREGROUND │ │ ├─33352 (wsgi:h -DFOREGROUND │ │ ├─33353 (wsgi:h -DFOREGROUND │ │ ├─33354 apache2 -DFOREGROUND │ │ └─33355 apache2 -DFOREGROUND │ ├─eebdc888ed35506ae789572dcd620cc7cacd131c048a14d8ffe54cd2076adf52 │ │ └─22309 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─b940b21362cef5af58fdc7aede55b4401738d1fef2147884eeb9e9ec150ee623 │ │ └─20597 /pause │ ├─bef695c392bb1a42432d3bcf9d4fbacdfcb99c20b74616cbf2715b90f17c08df │ │ ├─30965 apache2 -DFOREGROUND │ │ ├─33356 (wsgi:h -DFOREGROUND │ │ ├─33357 (wsgi:h -DFOREGROUND │ │ ├─33358 (wsgi:h -DFOREGROUND │ │ ├─33359 (wsgi:h -DFOREGROUND │ │ ├─33360 (wsgi:h -DFOREGROUND │ │ ├─33361 apache2 -DFOREGROUND │ │ └─33362 apache2 -DFOREGROUND │ ├─929713037f69ff54351a5682271240c5a313fff0f67f2061ff6ba6cfd66ff133 │ │ └─20508 /pause │ ├─7b26335d090a1ab7e3070f902be8aa862c6ee2145b7ca503da2bab9f30c52038 │ │ └─24165 /pause │ ├─490c9d48c969379494cb4cde2ebef0fb213e3e14e41db84be9bb74c10b0a49e5 │ │ ├─12270 mysqld --wsrep_start_position=0d51adf2-3c90-11f1-932f-869218e18beb:20 │ │ └─12394 /var/lib/mysql/mysql-state-monitor │ ├─933e32a9bc0985d92522d3fb8d45e2363cee0c57f7ec642d59b6fc526bd67d5a │ │ └─22972 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─83bd3e71b55c8a7309b3a854bd61a43c4e94185ddebd3fc49f1487258e32de6c │ │ └─23062 /bin/oauth2-proxy │ ├─ea452cf21bd7fa77fe1b7dda25416576183a0e24a41cb0ce43ca7e55839d8010 │ │ └─4819 /kube-vip manager │ ├─e040a97a8753b3822e5b2cd034b8fde13ffd50eceb84b46783502287d34010db │ │ └─5047 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─59285dd6f30b00d12d9b6dd2e20c9eb59b99ffa3347efd5a7f4c13d47407b2fa │ │ ├─6341 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6695 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─a6f7c8d1a3fc9eebd498a79a4e95720f86c4544b8367705a006c3c81504ac53d │ │ └─4678 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─542cfa9f5cfc0fa8abc848ce3eb318ea2ab4c3dc3c2737d86ff167a595c4a897 │ │ └─12064 /pause │ ├─440031658515fb6b5c250252954e5cae897f0f3cd9c1f684bcb903483eb65fdc │ │ └─23002 /bin/oauth2-proxy │ ├─1481e8078a9d5f1c67ef8b1ab0a267ebb27d2b4e06db1974bf13b553d50bfef0 │ │ └─4604 /pause │ ├─ab1b2e6fa032fe2ad6e2691b683a1700267f4cfbcdcde5307f0f24b00760251b │ │ └─7466 /pause │ ├─f929ab2f5db201026766d1dceffcef0f5d7699c760c4fad3bbbd547921f76a18 │ │ └─20891 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─8981d51a817ed619592d5a0e15152a63e41eb30174fdd9309b4e3c9fc790e7b4 │ │ ├─10516 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10529 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10657 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30684 nginx: worker process │ │ ├─30685 nginx: worker process │ │ └─30686 nginx: cache manager process │ ├─689a4137e08915b78f902b8ab577afc5a3c26c0027a29997dc0f1e0642ede319 │ │ └─22614 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─f834590edea7f4be29d59a9f447117eb837a4ca60f71e45488526b27196b6b80 │ │ └─4545 /pause │ ├─756d79fb41c390acfcb05255aaf0f31e15a67988cecd584ff507f30a3ecf7730 │ │ └─4742 kube-apiserver --advertise-address=199.19.213.206 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─1112ff4f943a9265276e167579b72bea05fb3762c5d75d7d93d78e0a5e68d852 │ │ └─22513 /pause │ ├─c35929ada8662c8840af193be6d29fe4d7daaa141948ac98188b55e82621e739 │ │ └─10254 /pause │ ├─94445fedc813d74803fb4fb57892438d6a1081116b8b7a506b190bb170df12e0 │ │ └─10319 /pause │ ├─833d661f350149245587d6a95e8c7134da749a1b7fe6bf52c95101eaa883a3e3 │ │ └─29591 /pause │ ├─503a941acd2c37960d474941ebd88f3cce426eb1863aa2f4326bef93e641d9c0 │ │ └─4565 /pause │ ├─2173a8806d6ba3bc292603363784deb3b497bf3b148dbcea02a480de16b229dc │ │ └─7446 /pause │ ├─239fad3fdcab36e3e3acf3d3bb2e0fd8dc0cb4150312091b5df3fd40b3a7855b │ │ └─14141 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─8f3415c64231872b749280c0a2c8ffcd414c2394eb708d79df99bfa4ce2289a7 │ │ └─8313 /pause │ ├─21732fb6703d2ad5987afc3163bf7b6bb02be3b057844128ed2c618c8968bb0f │ │ └─5023 /pause │ ├─ef79182d96800b16739b4a4d13f45d69cd1cb4a72422a61736d4e9beea6c7848 │ │ ├─30920 apache2 -DFOREGROUND │ │ ├─33363 (wsgi:h -DFOREGROUND │ │ ├─33364 (wsgi:h -DFOREGROUND │ │ ├─33365 (wsgi:h -DFOREGROUND │ │ ├─33366 (wsgi:h -DFOREGROUND │ │ ├─33367 (wsgi:h -DFOREGROUND │ │ ├─33368 apache2 -DFOREGROUND │ │ └─33369 apache2 -DFOREGROUND │ ├─e1b7bb2b9d376628d89b8ed475efda62b4dcac8ea58b6aaa57285df379dac017 │ │ └─7868 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─30389adfc870c73375e2868cc5d11008dd8ece913c109b7a68abb8ba57377fa3 │ │ └─8505 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─35a5d3edd357bde07ad8e0cadbecd83d54163e167015176e308fac20a7047a99 │ │ └─10574 /server │ ├─13de0220316207feacb784769a7b738f31ec509991e6c3b22fb80029fa56642d │ │ └─8351 /pause │ ├─8d7ffddb1c63100d3656e8784a295fc6eaede214485c5a6dcf2f657963c7a0e5 │ │ └─21830 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─a760af5e8c09804692de4aa5d7d02a7c3863caec06045113e653afeb144f6c55 │ │ └─11339 /pause │ ├─d7bc7872098ac2dfab93e00acf8b9ac7b1606e374b656ab043ceeab8f54a84a6 │ │ └─13794 /pause │ ├─b78d5f0b0a2a12336f55d562f51f1e11cb7bdfc521145508f349506388710916 │ │ └─10972 /pause │ ├─cb7579607d824df605c58a89ec98c3e3525524cde2df77533e9cef9565796b4a │ │ ├─23026 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23043 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-13.2.2.11/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -enable-feature maybe_expr │ │ ├─23049 erl_child_setup 1048576 │ │ ├─23128 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─23129 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─23139 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/epmd -daemon │ │ └─23289 /bin/sh -s rabbit_disk_monitor │ ├─a8ae950371a111187c40af3c18f7521b5766a0cf50ad90f96098de0137f097e4 │ │ └─14198 /bin/memcached_exporter │ ├─1e3cc21a4f003bc536c951ef6fa8555f40d9b8f09577fb106f7eb2de167aca75 │ │ └─22578 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-206.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─02c930674e515329fc3ef4693f5c9e3fec452bd3ad32dbb3be8963a52152da17 │ │ └─20635 /pause │ ├─b42e5adaff36578555474d706a00291abff4fc70fe8d65e7356fdfd230af256a │ │ └─4592 /pause │ ├─459e06f0c9abb4550b417706459fa27dece3ee2cb39120a315837cc1d125cca6 │ │ └─7521 /coredns -conf /etc/coredns/Corefile │ ├─2a5caa540136ba6db02cbe4d13d6f749b93125e1a375174c5389b2a836a7e493 │ │ └─8545 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─e4a0be8b17f6b85b4f1636987fccf33d7f24dd10eddce811caa761d4c6a07b2d │ │ └─11143 /manager --metrics-bind-address=:8080 │ ├─bf7fdcdccc72965a32d671a0251e921630ec58e5a8709eca62f927cdc1d946dd │ │ └─12366 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─1396d06b75521acd09c0f8a6043af4fd0f48bf20164463ced251c27d7e28906c │ │ └─5712 /pause │ ├─be20198332b9dd4a5b86bd61bf2f7612b02650e2298e85c504b6d8ed84d513f1 │ │ ├─12226 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13409 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ └─ac93fafa1e89ff7f04a47fab5f1997757fe0bcfcde638e957fb60c2ab18158d0 │ └─21748 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount