Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-4.scope │ │ ├─1357 sshd: zuul [priv] │ │ └─1370 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 633 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1361 ssh: /home/zuul/.ansible/cp/199.204.45.229-22-zuul [mux] │ ├─37968 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-fzrdignedhivmyqmfefbfscsmqwkubcu ; /usr/bin/python3'"'"' && sleep 0' │ ├─37969 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-fzrdignedhivmyqmfefbfscsmqwkubcu ; /usr/bin/python3' && sleep 0 │ ├─37970 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-fzrdignedhivmyqmfefbfscsmqwkubcu ; /usr/bin/python3 │ ├─37971 /bin/sh -c echo BECOME-SUCCESS-fzrdignedhivmyqmfefbfscsmqwkubcu ; /usr/bin/python3 │ ├─37972 /usr/bin/python3 │ ├─37973 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37975 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2880 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4441 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0b9e09b80728975bce2880789132fc023a14cb6cca6d859f23d159ad0f12fe05 -address /run/containerd/containerd.sock │ │ ├─ 4459 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8f2228b15abe96cd3c3c178e9f6481b49e60d081952de107d90e20b9d965305e -address /run/containerd/containerd.sock │ │ ├─ 4516 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 92432f234822b7414c3499fea337f14bb2add1311c88794be1193ca9a72750e1 -address /run/containerd/containerd.sock │ │ ├─ 4527 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0d914f6edfc225fbb6cee2ca2c225340953bd6d9384e2005ce061872501581aa -address /run/containerd/containerd.sock │ │ ├─ 4547 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 016b51ccd8616ea1b5ce3a5bdfc272b30a0887a86dd6bc7bab654b846ef01a39 -address /run/containerd/containerd.sock │ │ ├─ 5009 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id da46b5098b030abf08a9756cb151d0b704a57603163092f8b1d0afa361482659 -address /run/containerd/containerd.sock │ │ ├─ 5673 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 01b404a177cfa8085ebd7108c2d2eedadb4b9f8fdd90e3664009c18f4038aab5 -address /run/containerd/containerd.sock │ │ ├─ 5674 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ba85f716b3ba94fd0f24b44f4e405b1f870e3f706177ccabc20129a18fa76159 -address /run/containerd/containerd.sock │ │ ├─ 6851 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a08bb0b21a928525ee4307fd1ad4a2088f73a45bea0ad2518f3a75c54e2d46ea -address /run/containerd/containerd.sock │ │ ├─ 7229 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 409ed50794516088253e32dd9cd0b6078ce7b805dae8148e5e4f6dfaedceee2f -address /run/containerd/containerd.sock │ │ ├─ 7267 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7085252be1b789b9862681d60be9a2815cb233887eccaa46eeec6f67c24c8d0b -address /run/containerd/containerd.sock │ │ ├─ 7616 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d8931bd22a6e4dcb517f7cfb14b0f9338d6c8e3919f0a1f4c16cf9d9b89a9fdb -address /run/containerd/containerd.sock │ │ ├─ 8071 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3e576f8b20886b5c1f5ca4bbb2e457b4bcdc467410ddd5b1d244ea71b0a90b95 -address /run/containerd/containerd.sock │ │ ├─ 8117 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id df1077ba9c69c6f1521104dea9d69630e6132d211d94540ade9ee4f627a0e6df -address /run/containerd/containerd.sock │ │ ├─ 8158 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d14a84ef49fd04491cd0280256fff33e9c7a50b9b44978fdd8eab3d4a0a73dda -address /run/containerd/containerd.sock │ │ ├─10314 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 72896c15b625dce1b1d5f3695f0da0525230291f95455a6c44a40c232131b2a4 -address /run/containerd/containerd.sock │ │ ├─10404 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 566bbc1b20dbce5bad2af8e79e0d8cc4e9a35b733778f9496a5a9c8f293b1217 -address /run/containerd/containerd.sock │ │ ├─11014 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 01aaf2cf3c30afd67e78e66208cdfa53009c5cc72a9d72bb15157669be67cd94 -address /run/containerd/containerd.sock │ │ ├─11108 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3bebe1f58157ad294384d2691d6387a328f283993f6585c8002184bdc9747d7e -address /run/containerd/containerd.sock │ │ ├─11577 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f29be6e3a5d5a3836dfeadbe11d323c7ae911b8ecf1d506cca230f4c0d3019a7 -address /run/containerd/containerd.sock │ │ ├─11832 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 96303dac68b8b85d88254cb7798505f32861ab357ee5fff57ceeb7d0c801ec2c -address /run/containerd/containerd.sock │ │ ├─12204 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0de02cbb462e7d4595cbd2314b910283e3dfd8de27ce377a79764b5d7c9ba5ec -address /run/containerd/containerd.sock │ │ ├─13763 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 45e0f8c0a15ff05a187c83461a78dfe8ee09dce6f7e316ad3c02f97c5aa32fce -address /run/containerd/containerd.sock │ │ ├─14362 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cd207cc18ff8aa141fe9838b778faf3e4e1b938837c87d900ed2fd9c1e952a91 -address /run/containerd/containerd.sock │ │ ├─17825 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9a2530ae6aefd892962a6aab933a0419bd6a75a52fc1e5f18b711c2ac848fbab -address /run/containerd/containerd.sock │ │ ├─20264 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bb498290906799a2c0a33fe340e4e0550c8bb01abf73146fd484f2639533d093 -address /run/containerd/containerd.sock │ │ ├─20332 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3071b92c0ec1bb40914fc3baf065be27a21ce22910a32b7a34b2d96e30314b01 -address /run/containerd/containerd.sock │ │ ├─20369 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3f734907cbc936a127f70dbcd843bef188be5667822f24835a1c9dd4174bea94 -address /run/containerd/containerd.sock │ │ ├─20503 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 692210604a9bf007ff7df294b64b35b86d25733e8f7dbd919dccffeea2adb14a -address /run/containerd/containerd.sock │ │ ├─21823 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 329963077f2fc685d537845f02c7b627affd775dd4d93040af1662cc1f0b5254 -address /run/containerd/containerd.sock │ │ ├─21902 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ea5283156205deb5a606a9e0c0506fc67b7c6ceeb4984d528ba26ad8b15d8c28 -address /run/containerd/containerd.sock │ │ ├─22628 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b788e15a5463a3e7dee2fc1698c65cb538444726cef90f8a10e4622d6901f2e1 -address /run/containerd/containerd.sock │ │ ├─23876 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dbf2c6f60b40baa27e94c7abaaa2c0b3482df0507137ca484b184d0b575a15cb -address /run/containerd/containerd.sock │ │ ├─29439 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3a7f885f09fcf624ff8d68ff4cdc813aaa278c2b57380744db35fa6dc88ee36f -address /run/containerd/containerd.sock │ │ ├─29495 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1e42368ff8a8854f484ff61c7185431cab53d0299c62036974dd8a902380109a -address /run/containerd/containerd.sock │ │ └─29539 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 29653c55c957fd5e48e40e13173ad0f70e48168bb316b10f0a62f7a5653a2862 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1094 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─439 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─329 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─541 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─562 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─534 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4871 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.229 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─295 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─566 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1292 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─540 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─834a00551e1a17fa0e2b9236bd36cb727fa39475be97bc3b7402e28f2cb92d61 │ │ └─5059 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─1bce02a5be0fb5465197edd08edf36e15c1a6ffe33d688295db3662d255ee5ea │ │ └─6910 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─cd207cc18ff8aa141fe9838b778faf3e4e1b938837c87d900ed2fd9c1e952a91 │ │ └─14386 /pause │ ├─f29be6e3a5d5a3836dfeadbe11d323c7ae911b8ecf1d506cca230f4c0d3019a7 │ │ └─11603 /pause │ ├─e06c0b1ab3b643570461531acbef35565ba1fcf3b6c753fbf9cde3d20c3aff5d │ │ ├─6131 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6506 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─bb2822b0df659466e22163bc41ac99b6cfb90f79231fb65043042318ec42fc29 │ │ └─14147 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─df1077ba9c69c6f1521104dea9d69630e6132d211d94540ade9ee4f627a0e6df │ │ └─8143 /pause │ ├─f3c86261c420c0b25cb9c87ad33f9636a2d1332948ff4dfd7619da35720af66d │ │ └─20900 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─6acffcdf6821982095d0066f2100eea880154901282e4c99fe07e69bae851058 │ │ └─4680 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─ea016edc12c5a483c7009b1cef51519872fab503d8e491e65874bef6fb27c0e3 │ │ └─4727 etcd --advertise-client-urls=https://199.204.45.229:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.229:2380 --initial-cluster=instance=https://199.204.45.229:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.229:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.229:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─3461f843090076d14916bcbb1b360c1cb4d61adaa8d1a56be1cbfa3fd976f7c9 │ │ └─22505 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─7085252be1b789b9862681d60be9a2815cb233887eccaa46eeec6f67c24c8d0b │ │ └─7290 /pause │ ├─3e576f8b20886b5c1f5ca4bbb2e457b4bcdc467410ddd5b1d244ea71b0a90b95 │ │ └─8094 /pause │ ├─9a2530ae6aefd892962a6aab933a0419bd6a75a52fc1e5f18b711c2ac848fbab │ │ └─17849 /pause │ ├─da46b5098b030abf08a9756cb151d0b704a57603163092f8b1d0afa361482659 │ │ └─5034 /pause │ ├─592173628cb5ad8be156b4905b206247658b549959e59bec1b6350fb03876d0a │ │ └─11251 /manager --metrics-bind-address=:9782 │ ├─3a7f885f09fcf624ff8d68ff4cdc813aaa278c2b57380744db35fa6dc88ee36f │ │ └─29463 /pause │ ├─fe587edf09eed3dcde3a1e47b0aedd6e716cf7939cd7cc489f03e79abafe9d68 │ │ ├─20754 python -u /app/sidecar.py │ │ ├─20926 python -u /app/sidecar.py │ │ └─20927 python -u /app/sidecar.py │ ├─1616fe24ef7ef474e03a51837cb00d8e65aa0bb2664d5a8dd9fc507a18ef26d4 │ │ └─8363 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─01aaf2cf3c30afd67e78e66208cdfa53009c5cc72a9d72bb15157669be67cd94 │ │ └─11039 /pause │ ├─2e26f37e076e8c0b719b7106f706abf314263d040a06317953854ae36472746a │ │ └─5932 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─a3a80a49a060fbeeccefc96466796044e7a14bd5244b579ac65e5506fe124696 │ │ └─4824 /kube-vip manager │ ├─29653c55c957fd5e48e40e13173ad0f70e48168bb316b10f0a62f7a5653a2862 │ │ └─29575 /pause │ ├─0b9e09b80728975bce2880789132fc023a14cb6cca6d859f23d159ad0f12fe05 │ │ └─4509 /pause │ ├─50c47541a1e7cedd913b4a80b0ab617dd3715dd45671a439a9cce66bc9e79d47 │ │ ├─26263 apache2 -DFOREGROUND │ │ ├─26279 (wsgi:k -DFOREGROUND │ │ ├─26280 (wsgi:k -DFOREGROUND │ │ ├─26281 (wsgi:k -DFOREGROUND │ │ ├─26282 (wsgi:k -DFOREGROUND │ │ ├─26285 apache2 -DFOREGROUND │ │ ├─26286 apache2 -DFOREGROUND │ │ ├─26287 apache2 -DFOREGROUND │ │ ├─26290 apache2 -DFOREGROUND │ │ ├─26291 apache2 -DFOREGROUND │ │ ├─26292 apache2 -DFOREGROUND │ │ ├─26293 apache2 -DFOREGROUND │ │ ├─26294 apache2 -DFOREGROUND │ │ ├─26295 apache2 -DFOREGROUND │ │ └─26297 apache2 -DFOREGROUND │ ├─4107315562703f7daf952154b769be7f288d020e739147781e4c24914ff44d44 │ │ └─12328 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─f79624a81c0f0e45dfbf9c25cf6e5d78c5426295146c6e8f929920bc18579426 │ │ └─14492 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─7ab8bd2610fd92cd14f6ff8d80dc86e6c7051fb6946a94972fd8ceea76b6cd2d │ │ └─22552 /bin/oauth2-proxy │ ├─01b404a177cfa8085ebd7108c2d2eedadb4b9f8fdd90e3664009c18f4038aab5 │ │ └─5721 /pause │ ├─8644924e840245d05e825ec7acf50a3c0c8abb338a4aed414c8449a4130ea067 │ │ ├─12402 mysqld --wsrep_start_position=cb038a6c-42d3-11f1-9611-7e0c2ab28416:20 │ │ └─12523 /var/lib/mysql/mysql-state-monitor │ ├─3bebe1f58157ad294384d2691d6387a328f283993f6585c8002184bdc9747d7e │ │ └─11132 /pause │ ├─ba85f716b3ba94fd0f24b44f4e405b1f870e3f706177ccabc20129a18fa76159 │ │ └─5723 /pause │ ├─d14a84ef49fd04491cd0280256fff33e9c7a50b9b44978fdd8eab3d4a0a73dda │ │ └─8181 /pause │ ├─409ed50794516088253e32dd9cd0b6078ce7b805dae8148e5e4f6dfaedceee2f │ │ └─7253 /pause │ ├─7af0b90393642e906c214261db688c9337374c4b419dfdb54cd097db4943114e │ │ └─7773 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─df22870481779d440b4641a587ee24b7131c09fd382e4736d0e5e3996d61e188 │ │ └─4701 kube-apiserver --advertise-address=199.204.45.229 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─a08bb0b21a928525ee4307fd1ad4a2088f73a45bea0ad2518f3a75c54e2d46ea │ │ └─6875 /pause │ ├─65a018aa3de4c75b7be97bfe28de41fe0ae2c5c4e3fe052a44291464da6a75fb │ │ └─10708 /server │ ├─e017a3a66ba4d7df3ee4fe0cdc7b214d95432d2074d5cf907073316e83ecc9ab │ │ ├─22967 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─22984 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-14.2.5.1/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─22990 erl_child_setup 1048576 │ │ ├─23021 sh -s disksup │ │ ├─23023 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/memsup │ │ ├─23024 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/cpu_sup │ │ ├─23025 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─23026 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─23036 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/epmd -daemon │ │ └─23143 /bin/sh -s rabbit_disk_monitor │ ├─25b20a75517baf455fd728d34d4141f0210f195f15bf3b0519755719aa82fbc5 │ │ └─22711 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─df20197ad44c31718269392372e579b92149accb0e5d66baa540c89dc30a86e8 │ │ └─22384 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─8f2228b15abe96cd3c3c178e9f6481b49e60d081952de107d90e20b9d965305e │ │ └─4508 /pause │ ├─5546f2be47c05000184f8454858a1312dc449d11d33fb9b9229cf15ab1136db3 │ │ ├─30799 apache2 -DFOREGROUND │ │ ├─32986 (wsgi:h -DFOREGROUND │ │ ├─32987 (wsgi:h -DFOREGROUND │ │ ├─32988 (wsgi:h -DFOREGROUND │ │ ├─32989 (wsgi:h -DFOREGROUND │ │ ├─32990 (wsgi:h -DFOREGROUND │ │ ├─32991 apache2 -DFOREGROUND │ │ └─32992 apache2 -DFOREGROUND │ ├─c8bf42f91160b13ddecd077544159ff09618806c1e34695fd0e62abf86c74738 │ │ └─22427 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─3071b92c0ec1bb40914fc3baf065be27a21ce22910a32b7a34b2d96e30314b01 │ │ └─20355 /pause │ ├─7736c1413d846c1d607d81172047e14a73169194d978a598402f69e271215cf1 │ │ └─17887 /secretgen-controller │ ├─957899ecd62078da365b7c707b235da9dd2c16f0aeb2a9136f03308b32336f76 │ │ └─7341 /coredns -conf /etc/coredns/Corefile │ ├─fd9620236cb5c03c1f09aaf46a9dc9fb732eba357434c9ca68ad091005f0a2dc │ │ └─21707 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─566bbc1b20dbce5bad2af8e79e0d8cc4e9a35b733778f9496a5a9c8f293b1217 │ │ └─10427 /pause │ ├─a2aff7346f1489b01b72178dbe3ac48d11749fdeb9ddd4b89bcbe5f6812d9c56 │ │ └─21006 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─bb498290906799a2c0a33fe340e4e0550c8bb01abf73146fd484f2639533d093 │ │ └─20295 /pause │ ├─92432f234822b7414c3499fea337f14bb2add1311c88794be1193ca9a72750e1 │ │ └─4600 /pause │ ├─031ee9f870d8587de143bc2793db9b21c7cc58f27eade8f43b355529ce18f7a9 │ │ └─14211 /bin/memcached_exporter │ ├─1e42368ff8a8854f484ff61c7185431cab53d0299c62036974dd8a902380109a │ │ └─29537 /pause │ ├─3737234958b65ca2221a81451b092ca1d57e34a3c3e068fe0ebc712e2bdbcc40 │ │ └─21171 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─3f734907cbc936a127f70dbcd843bef188be5667822f24835a1c9dd4174bea94 │ │ └─20394 /pause │ ├─b788e15a5463a3e7dee2fc1698c65cb538444726cef90f8a10e4622d6901f2e1 │ │ └─22652 /pause │ ├─d88e13f1cc163ebb49992e2c1d07ff9222393fee84e7026fbb2ab544492b58af │ │ ├─31226 apache2 -DFOREGROUND │ │ ├─33214 (wsgi:h -DFOREGROUND │ │ ├─33215 (wsgi:h -DFOREGROUND │ │ ├─33216 (wsgi:h -DFOREGROUND │ │ ├─33217 (wsgi:h -DFOREGROUND │ │ ├─33218 (wsgi:h -DFOREGROUND │ │ ├─33219 apache2 -DFOREGROUND │ │ └─33220 apache2 -DFOREGROUND │ ├─5a002cdd4ee423169d79006e2124c4913307ac992c040b658e571b76e28dbda2 │ │ ├─10647 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10659 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10768 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30544 nginx: worker process │ │ ├─30545 nginx: worker process │ │ └─30546 nginx: cache manager process │ ├─670425337df84b0b34df8bd0eedca02070ffa2a22cb7921bab6dc35ae5a2c90c │ │ └─11722 percona-xtradb-cluster-operator │ ├─be1a593de855e60daa4aa5081021f92bc87ccd3162e0a51e67f1666b08bbad83 │ │ └─22341 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-229.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─c18795c2872cd6dac2585ea70ea952c5c7246cedccac5fcf1dea2b9717c55dcd │ │ ├─12253 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13429 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─d8931bd22a6e4dcb517f7cfb14b0f9338d6c8e3919f0a1f4c16cf9d9b89a9fdb │ │ └─7640 /pause │ ├─72896c15b625dce1b1d5f3695f0da0525230291f95455a6c44a40c232131b2a4 │ │ └─10344 /pause │ ├─8b43e43ac9de396392445c00efc3ff8c879e035d7c915aeecb4305ce6bfe8ac8 │ │ └─7323 /coredns -conf /etc/coredns/Corefile │ ├─fd80200279a4977ee5d8da74959ec2917fd5407eb85dc8dafd18b2ed98335cfd │ │ └─4736 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─ea5283156205deb5a606a9e0c0506fc67b7c6ceeb4984d528ba26ad8b15d8c28 │ │ └─21926 /pause │ ├─927e1b323182b4392438594f61bd2a14a1416a02748c5d91b22db1f20ee47d2a │ │ └─8288 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─773d69e0fdd39c894544108403f36c828843a2a46e565f8d90e36d8d6b51d0d8 │ │ └─8325 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─692210604a9bf007ff7df294b64b35b86d25733e8f7dbd919dccffeea2adb14a │ │ └─20526 /pause │ ├─cacd095fff5ebc7be53ab0126d9f6c8b53087be636775cc7e4c2989b885bc80e │ │ └─22473 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-229.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─f42161314af4397affccaee1b1d1d8c8f39a6c7deab356981acd1ded87f61bd5 │ │ └─11404 /manager --metrics-bind-address=:8080 │ ├─c6b8039be3759fd2a41de0241b90b558387efc9f09cbb7520c9c8ed175d12bdf │ │ ├─20783 python -u /app/sidecar.py │ │ ├─20930 python -u /app/sidecar.py │ │ └─20931 python -u /app/sidecar.py │ ├─0d914f6edfc225fbb6cee2ca2c225340953bd6d9384e2005ce061872501581aa │ │ └─4597 /pause │ ├─dbf2c6f60b40baa27e94c7abaaa2c0b3482df0507137ca484b184d0b575a15cb │ │ └─23899 /pause │ ├─329963077f2fc685d537845f02c7b627affd775dd4d93040af1662cc1f0b5254 │ │ └─21849 /pause │ ├─0de02cbb462e7d4595cbd2314b910283e3dfd8de27ce377a79764b5d7c9ba5ec │ │ └─12227 /pause │ ├─06189449868d3d189489668856badc73f933348a312e748594917a7e5a00e8e0 │ │ └─12499 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─96303dac68b8b85d88254cb7798505f32861ab357ee5fff57ceeb7d0c801ec2c │ │ └─11854 /pause │ ├─45e0f8c0a15ff05a187c83461a78dfe8ee09dce6f7e316ad3c02f97c5aa32fce │ │ └─13787 /pause │ ├─0acf740f8d1715a67cc64b542ce7f0669813cb3b5eb38fe9c0b0e4210a16fe4b │ │ ├─30806 apache2 -DFOREGROUND │ │ ├─32908 (wsgi:h -DFOREGROUND │ │ ├─32909 (wsgi:h -DFOREGROUND │ │ ├─32910 (wsgi:h -DFOREGROUND │ │ ├─32911 (wsgi:h -DFOREGROUND │ │ ├─32912 (wsgi:h -DFOREGROUND │ │ ├─32913 apache2 -DFOREGROUND │ │ └─32914 apache2 -DFOREGROUND │ ├─5215845baf425b74ec9dd654f4036dbc3ee6575de9ff801f9a13c80cab1c778f │ │ └─22614 /bin/oauth2-proxy │ └─016b51ccd8616ea1b5ce3a5bdfc272b30a0887a86dd6bc7bab654b846ef01a39 │ └─4612 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount