Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─618 /lib/systemd/systemd --user │ │ └─619 (sd-pam) │ ├─session-4.scope │ │ ├─1352 sshd: zuul [priv] │ │ └─1365 sshd: zuul@notty │ └─session-1.scope │ ├─ 615 sshd: zuul [priv] │ ├─ 632 sshd: zuul@notty │ ├─ 769 /usr/bin/python3 │ ├─ 1356 ssh: /home/zuul/.ansible/cp/199.204.45.250-22-zuul [mux] │ ├─36554 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-weaeygbdkcmeaxwohdqjjxvyftlkmbhy ; /usr/bin/python3'"'"' && sleep 0' │ ├─36555 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-weaeygbdkcmeaxwohdqjjxvyftlkmbhy ; /usr/bin/python3' && sleep 0 │ ├─36556 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-weaeygbdkcmeaxwohdqjjxvyftlkmbhy ; /usr/bin/python3 │ ├─36557 /bin/sh -c echo BECOME-SUCCESS-weaeygbdkcmeaxwohdqjjxvyftlkmbhy ; /usr/bin/python3 │ ├─36558 /usr/bin/python3 │ ├─36559 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─36561 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2873 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4433 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 14d1b2d65d9b63c5ede9c9548993377d23671bc53b27841250f0de78ba661e53 -address /run/containerd/containerd.sock │ │ ├─ 4471 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4b9a0aac2e7c631841bc852191604da46eb665930ee6993bd3464d2486463381 -address /run/containerd/containerd.sock │ │ ├─ 4497 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 174d7866c6651aadeba68e9da54d1c4a52bcd78002e734746c6dd29d78cc4ca5 -address /run/containerd/containerd.sock │ │ ├─ 4499 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c136d976d57a98afc45606be2a7427cafa7948bd8ac9415e3cd6d30dc923da4a -address /run/containerd/containerd.sock │ │ ├─ 4514 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dcc73270e3bc08cfbb8f27ecea85f66cd4e1e226def50d142d86cd7ef4c71bde -address /run/containerd/containerd.sock │ │ ├─ 4999 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ec269d0257be9933826b3aeb2175d5e2e4dd9fa2bcc65b577135864ee3849eb2 -address /run/containerd/containerd.sock │ │ ├─ 5656 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8f7db69c964169b6ceb5621770a4c0c75d031f9988fc3dec479a452cec8043ea -address /run/containerd/containerd.sock │ │ ├─ 5705 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9e09974b25399f94818370dc5f04cae535abbd2d0498b87f65e0099ed0f17d86 -address /run/containerd/containerd.sock │ │ ├─ 6927 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9bd32e620f2518c5c5c1aaada5462751c8b6040bda65598627505328e27c8440 -address /run/containerd/containerd.sock │ │ ├─ 7287 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 41cae8d78dee07b650f69bdbe6f82a25102a7f5d7d18274ffc572ddc39fec988 -address /run/containerd/containerd.sock │ │ ├─ 7331 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 96d9f76eba77439eeb394b11232adfdd353dedbb281d463a6af70e6a3cb12af6 -address /run/containerd/containerd.sock │ │ ├─ 7709 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b1844310fd1ba48a5762fb914bee11df1aecfcd9aacaae498481b4ae1dd2839b -address /run/containerd/containerd.sock │ │ ├─ 8254 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a9bf1def7d461b2dd89eea027eb527a16ebc275c7a2fbb60004c3e14bf7aad33 -address /run/containerd/containerd.sock │ │ ├─ 8298 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 39d96e0ca4f99c0db12fb556bea3df1a8380eb31797654fc5f7654a1df0290fa -address /run/containerd/containerd.sock │ │ ├─ 8336 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 766dfe652d70dbcfc342134f0725b8c6cfdd1c00a7edcdc0ee428b1086b2cc8f -address /run/containerd/containerd.sock │ │ ├─10228 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e1714ff781f2fec64d7cc383d1446eb52c7e0d9a1ed05e71a34709c5c7bebc36 -address /run/containerd/containerd.sock │ │ ├─10315 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0bf2b735f678667d48124a202deb415d4b708d107228d38e581177a416d84de2 -address /run/containerd/containerd.sock │ │ ├─11030 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ed1199ddbaf635613eecd8db39fe084fa6dd531f51f4e9f748eec187882b71b7 -address /run/containerd/containerd.sock │ │ ├─11066 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c367f7278bdba3bee268fc462789c09bc36dee84a573bf3dff9ece43a84e557c -address /run/containerd/containerd.sock │ │ ├─11358 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7d27a4a8a2ce6dda8d80e15ffd669f3e972a37ab7987e017cb4b0384272a1513 -address /run/containerd/containerd.sock │ │ ├─11806 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1147fbfd2e9f5d8355785295cd1bbd044593f51b94ea3299141b0afc23df39c0 -address /run/containerd/containerd.sock │ │ ├─12132 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d3e0289fbf55e6a45ae2cbd675b65384015677f9be036882c0c1acdcfa3d7fa6 -address /run/containerd/containerd.sock │ │ ├─13571 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 94a9659b4dd7b506445f301c0e71653265d2837327b47430a20f8e7b336264be -address /run/containerd/containerd.sock │ │ ├─14160 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c476631a01b07df8d86ba5c63c60b7e8ec056108bd47c2ab47e8de8bd61b0932 -address /run/containerd/containerd.sock │ │ ├─16223 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 062a2ec304ccd9543ac0dbb91869ba45e40b51f2f392a2b9258d6926659114e7 -address /run/containerd/containerd.sock │ │ ├─18484 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c8048b83c9bc53fca42b5b3fed4addba8b75d4574dde62b316b2a849be406bea -address /run/containerd/containerd.sock │ │ ├─18594 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e8e32181cb4a674d73bc7b6256f7f8d0f2960e3a3e4468dec26fde5bbf966747 -address /run/containerd/containerd.sock │ │ ├─18632 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 835ba5567f687d573b3080ffb4f856528478a6d8966de95dd3d23958f1b974ac -address /run/containerd/containerd.sock │ │ ├─18672 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eb89ea51f5ba0b45afb07a238445eee6dee19c4a55beab3c43195e7b86a46ab0 -address /run/containerd/containerd.sock │ │ ├─19650 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e8787977dd8aab39b32f420fee594dbe24dc46b3ad8c34ae71f418b40e4f0e15 -address /run/containerd/containerd.sock │ │ ├─19746 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 56c6a419c3df16704bd56bcbfdef60f4851d291a51e0bc00cc8a3b7c40aefe42 -address /run/containerd/containerd.sock │ │ ├─20437 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1967ee71869f8bd1cace8b49fe13e0dfb2b8f99627f6d2f6a24d386b3a5560eb -address /run/containerd/containerd.sock │ │ ├─21960 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 336a4a552f7c5b5d40656d984e5fede869c9ccf69a9c17499715bce1c44c7bdc -address /run/containerd/containerd.sock │ │ ├─27211 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3fd59e25b9d9b041cd3dffe1146ab9af176ce59a0abfd867a052d7890a3d86f8 -address /run/containerd/containerd.sock │ │ ├─27252 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9bdf8b5920b898d5421345d69cd5530f9a400dd6afdc4271b5b172740b8eca07 -address /run/containerd/containerd.sock │ │ └─27310 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7f286f191c92ee2f80810c1c269a0cde0eae4c0bbdfffeb064b95ab90837a544 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1093 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─436 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─329 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─559 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─531 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4866 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.250 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─564 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1287 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─528 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─543 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─534 /lib/systemd/systemd-logind ├─k8s.io │ ├─64a1012a88d127b65c33dbeba1819e31c02ad73fca08a7fb90119acd4eb0d351 │ │ └─20912 /bin/oauth2-proxy │ ├─a646e9b9e1eabab1588949232ba7515e354f1e881f43ba8964f9495d549258ad │ │ └─20655 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-250.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─1c975fce6704a616ee7a046e0c0bfcf48b5d9c05d345c4584ec8ebb4e22d8c1e │ │ └─6988 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─e1714ff781f2fec64d7cc383d1446eb52c7e0d9a1ed05e71a34709c5c7bebc36 │ │ └─10258 /pause │ ├─062a2ec304ccd9543ac0dbb91869ba45e40b51f2f392a2b9258d6926659114e7 │ │ └─16248 /pause │ ├─b1844310fd1ba48a5762fb914bee11df1aecfcd9aacaae498481b4ae1dd2839b │ │ └─7733 /pause │ ├─d051d9bc4a9636d401cf6038132878f411f9358df79f94b16a4d768a897d99fa │ │ └─20144 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─ec269d0257be9933826b3aeb2175d5e2e4dd9fa2bcc65b577135864ee3849eb2 │ │ └─5022 /pause │ ├─eb89ea51f5ba0b45afb07a238445eee6dee19c4a55beab3c43195e7b86a46ab0 │ │ └─18702 /pause │ ├─d3e0289fbf55e6a45ae2cbd675b65384015677f9be036882c0c1acdcfa3d7fa6 │ │ └─12156 /pause │ ├─d67346cc0e5d58b6a7a9e8200a9ec14dd7089b7cfdd119782c70a205207b7e5d │ │ └─10604 /server │ ├─95b8ed0c6d56845a47cdb005684bfafe7a7fc9e55b8bd67b112517eb7c8fc9d2 │ │ └─20593 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─2ca37a056ce76bde692a3aaecffbd9867619f0dac30593b70f04d3eeb3f06f01 │ │ └─19479 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─073e03d07f77a377161ed9a7da2af4c4a4b4429d008ddc9201cddf9c3a3088dd │ │ └─4778 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─174d7866c6651aadeba68e9da54d1c4a52bcd78002e734746c6dd29d78cc4ca5 │ │ └─4609 /pause │ ├─835ba5567f687d573b3080ffb4f856528478a6d8966de95dd3d23958f1b974ac │ │ └─18674 /pause │ ├─7afb94c28f4cbad0f0f759bce348ae00db1e0d514024fdcb4ddca65ef40f9f4b │ │ └─12249 mysqld --wsrep_start_position=714a7d35-3c74-11f1-9df0-9a27c6babd0b:22 │ ├─dcc73270e3bc08cfbb8f27ecea85f66cd4e1e226def50d142d86cd7ef4c71bde │ │ └─4600 /pause │ ├─0bf2b735f678667d48124a202deb415d4b708d107228d38e581177a416d84de2 │ │ └─10338 /pause │ ├─7d27a4a8a2ce6dda8d80e15ffd669f3e972a37ab7987e017cb4b0384272a1513 │ │ └─11383 /pause │ ├─cf167ab5ea97c9d491d1192bd44b0190e5feac38aed860306cdea76d8646b1f1 │ │ └─20931 /bin/oauth2-proxy │ ├─9bd32e620f2518c5c5c1aaada5462751c8b6040bda65598627505328e27c8440 │ │ └─6952 /pause │ ├─7f286f191c92ee2f80810c1c269a0cde0eae4c0bbdfffeb064b95ab90837a544 │ │ └─27348 /pause │ ├─6595ab2aa7330b6b0adc9ab6c097d0e6fcb9624b1499ab1465c513a13efc84de │ │ ├─10534 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10547 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10667 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─28275 nginx: worker process │ │ ├─28276 nginx: worker process │ │ └─28277 nginx: cache manager process │ ├─9bdf8b5920b898d5421345d69cd5530f9a400dd6afdc4271b5b172740b8eca07 │ │ └─27281 /pause │ ├─ed1199ddbaf635613eecd8db39fe084fa6dd531f51f4e9f748eec187882b71b7 │ │ └─11064 /pause │ ├─5bc8c51efcf4f753d14c0cddf0308f658dd3173b28c356ff5935439279a4fe51 │ │ └─7850 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─ec83a5a9e10cf1163b46c3996b002a819363c3735922ecd87c0392e03f5475e9 │ │ └─4728 kube-apiserver --advertise-address=199.204.45.250 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─98d4e651951e46c60e093cb21fa8437835f92497b78edf2de5f8a53af1346e6c │ │ └─20377 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─8f7db69c964169b6ceb5621770a4c0c75d031f9988fc3dec479a452cec8043ea │ │ └─5684 /pause │ ├─aab131e14f0827696e0b6aa85ea8581c56bd159c7c530dca408b9afbb32c911f │ │ └─7373 /coredns -conf /etc/coredns/Corefile │ ├─9b9aa497c7607aaac3d34301f55175a657eb866c1c33f25be41180e49ff5384a │ │ └─4819 /kube-vip manager │ ├─c3ab81747436a1afd2bfd461bc3af7d5c564eabebf135590358d0dde0e762060 │ │ ├─28521 apache2 -DFOREGROUND │ │ ├─31342 (wsgi:h -DFOREGROUND │ │ ├─31343 (wsgi:h -DFOREGROUND │ │ ├─31344 (wsgi:h -DFOREGROUND │ │ ├─31345 (wsgi:h -DFOREGROUND │ │ ├─31346 (wsgi:h -DFOREGROUND │ │ ├─31347 apache2 -DFOREGROUND │ │ └─31348 apache2 -DFOREGROUND │ ├─a9bf1def7d461b2dd89eea027eb527a16ebc275c7a2fbb60004c3e14bf7aad33 │ │ └─8277 /pause │ ├─f50ae500aacbf2c2ae816562d855c8151a99345487c58fc40d77a5604d62c027 │ │ └─12345 /bin/mysqld_exporter --collect.info_schema.processlist │ ├─596dd4fecfac5ff2a9a4cfe7de0865bcdb0ced4341d4f833368cbe30a8a8a4f4 │ │ └─20559 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-250.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─b310b097a3fbbef659cbc0fa12cc8bb448dbea755d036ea87e14e623a70085f9 │ │ └─8542 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─19287e407cb4b86559c9f48955471989d6c929ec20181e133d8f18b7d73c1315 │ │ ├─33853 apache2 -DFOREGROUND │ │ ├─34991 (wsgi:h -DFOREGROUND │ │ ├─34992 (wsgi:h -DFOREGROUND │ │ ├─34993 (wsgi:h -DFOREGROUND │ │ ├─34994 (wsgi:h -DFOREGROUND │ │ ├─34995 (wsgi:h -DFOREGROUND │ │ ├─34996 apache2 -DFOREGROUND │ │ └─34997 apache2 -DFOREGROUND │ ├─5b48048de979ce6f071122be4a91de0cbd92b0492ff053d7a94810ae30900151 │ │ └─8504 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.10 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─b349be5af972f24f5a64393ace67259013006baa07c6d9770379caeb2091672c │ │ └─11221 /manager --metrics-bind-address=:9782 │ ├─e8e32181cb4a674d73bc7b6256f7f8d0f2960e3a3e4468dec26fde5bbf966747 │ │ └─18618 /pause │ ├─443d6003dc6ff066ce96c51ca71e18c88ed30ac9f4b4cc4c802c5979ddffe388 │ │ ├─19350 python -u /app/sidecar.py │ │ ├─19565 python -u /app/sidecar.py │ │ └─19566 python -u /app/sidecar.py │ ├─96d9f76eba77439eeb394b11232adfdd353dedbb281d463a6af70e6a3cb12af6 │ │ └─7360 /pause │ ├─94a9659b4dd7b506445f301c0e71653265d2837327b47430a20f8e7b336264be │ │ └─13595 /pause │ ├─487e21200e43bbe2e2a1b365fd4ac4b1775b2c0592d803a2cc9db21c5cdd499d │ │ └─20728 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─4b9a0aac2e7c631841bc852191604da46eb665930ee6993bd3464d2486463381 │ │ └─4578 /pause │ ├─96251e259e4f7ca3cc37b9099c72b495631019718cec2ee7371b2968d47e0936 │ │ └─19635 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─46fc7eb3f739700898681ce96883e3e9c3a72554fdf1bc1bef33610c3b1bb139 │ │ └─14253 java -Dkc.config.built=true -Xms64m -Xmx512m -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --auto-build --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─1850c9999830bf49cf42b6f154c3a721db240c457a6440df2efa3aa403427d4f │ │ └─4676 etcd --advertise-client-urls=https://199.204.45.250:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.250:2380 --initial-cluster=instance=https://199.204.45.250:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.250:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.250:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─b2f284b5523e729bdf3b336ae71931f24afe1763c1e124b7acc179053590b403 │ │ ├─24080 apache2 -DFOREGROUND │ │ ├─24111 (wsgi:k -DFOREGROUND │ │ ├─24112 (wsgi:k -DFOREGROUND │ │ ├─24113 (wsgi:k -DFOREGROUND │ │ ├─24114 (wsgi:k -DFOREGROUND │ │ ├─24115 apache2 -DFOREGROUND │ │ ├─24117 apache2 -DFOREGROUND │ │ ├─24120 apache2 -DFOREGROUND │ │ ├─24122 apache2 -DFOREGROUND │ │ ├─24124 apache2 -DFOREGROUND │ │ ├─24127 apache2 -DFOREGROUND │ │ ├─24128 apache2 -DFOREGROUND │ │ ├─24129 apache2 -DFOREGROUND │ │ ├─24130 apache2 -DFOREGROUND │ │ └─24131 apache2 -DFOREGROUND │ ├─336a4a552f7c5b5d40656d984e5fede869c9ccf69a9c17499715bce1c44c7bdc │ │ └─21986 /pause │ ├─595443f28612100d343cd7b5f34cf62fd7f98632c04a723dedebe4a9f22ba1df │ │ ├─19327 python -u /app/sidecar.py │ │ ├─19538 python -u /app/sidecar.py │ │ └─19539 python -u /app/sidecar.py │ ├─1147fbfd2e9f5d8355785295cd1bbd044593f51b94ea3299141b0afc23df39c0 │ │ └─11829 /pause │ ├─56c6a419c3df16704bd56bcbfdef60f4851d291a51e0bc00cc8a3b7c40aefe42 │ │ └─19787 /pause │ ├─afb6c5471d34b98ce7f7fdb874f103a564d9b0ebaacee1518a40159bf8afe614 │ │ └─5049 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─30fa1079a485e8876223f81ae0e435685181a981017fd50ce7711408292e326d │ │ └─8466 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─b7fd26d95e7dd5d71c1299fd0cf3c16821fe42523979e6961c834a9a50884810 │ │ ├─28538 apache2 -DFOREGROUND │ │ ├─31354 (wsgi:h -DFOREGROUND │ │ ├─31355 (wsgi:h -DFOREGROUND │ │ ├─31356 (wsgi:h -DFOREGROUND │ │ ├─31357 (wsgi:h -DFOREGROUND │ │ ├─31358 (wsgi:h -DFOREGROUND │ │ ├─31359 apache2 -DFOREGROUND │ │ └─31360 apache2 -DFOREGROUND │ ├─e8787977dd8aab39b32f420fee594dbe24dc46b3ad8c34ae71f418b40e4f0e15 │ │ └─19683 /pause │ ├─314e38ee34eca265034d0d971bac3bc0b6826446e2e689bd4e5b84d4c4f05122 │ │ └─11181 /manager --metrics-bind-address=:8080 │ ├─7baf07287c6dde168467696d64c91ec4dfc6484709b99e579147880514573d9c │ │ ├─20954 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─20970 /usr/local/lib/erlang/erts-12.3.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /usr/local/lib/erlang -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─20977 erl_child_setup 1048576 │ │ ├─21048 /usr/local/lib/erlang/erts-12.3.2/bin/epmd -daemon │ │ ├─21083 inet_gethost 4 │ │ └─21084 inet_gethost 4 │ ├─2d7420c2d8031792c39f34aa18b9360cb4558dc740c2b686ea05126fc7013411 │ │ └─13938 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─752e27b8be3aa89969284a220729b01326d960ca08ad62f5a62196bd4f697804 │ │ └─19004 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.34.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─41cae8d78dee07b650f69bdbe6f82a25102a7f5d7d18274ffc572ddc39fec988 │ │ └─7310 /pause │ ├─9e09974b25399f94818370dc5f04cae535abbd2d0498b87f65e0099ed0f17d86 │ │ └─5733 /pause │ ├─a0c00e58b9f92592db3b4b0a86ea6851cb254a2cd7982ea1ecb857c30cc17d3d │ │ └─6040 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─9738ab609c14ac4bbcf8f38e301298eb9abe3f60bc163e6ed4d3ba3aa5422343 │ │ └─20690 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─8d6b7573aaad94a12e94a495a12ced2fa8a24603b698506cc9a6bd41d7542b91 │ │ └─12101 /usr/bin/peer-list -on-change=/usr/bin/add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─39d96e0ca4f99c0db12fb556bea3df1a8380eb31797654fc5f7654a1df0290fa │ │ └─8321 /pause │ ├─40012841acd74fd0e450c1734e11ccc1c03a163c828d83ae4c257ffc4aaaaf99 │ │ ├─12021 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13175 haproxy -sf 11 -x sockpair@3 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─3fd59e25b9d9b041cd3dffe1146ab9af176ce59a0abfd867a052d7890a3d86f8 │ │ └─27236 /pause │ ├─766dfe652d70dbcfc342134f0725b8c6cfdd1c00a7edcdc0ee428b1086b2cc8f │ │ └─8359 /pause │ ├─9c7396bcb5cf48b19b432d60d485d355f20916e7d178b8497f4718f095921529 │ │ └─11633 percona-xtradb-cluster-operator │ ├─c476631a01b07df8d86ba5c63c60b7e8ec056108bd47c2ab47e8de8bd61b0932 │ │ └─14183 /pause │ ├─d7d2a732b6d071ff5852dc946e288ad8d9ea67916994d4c51a29d0341dcd50f0 │ │ └─4703 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─22bedce7740b5049903358a9eb3a6a33fb12dac1d471a68fa22d5ecf6f08e5c4 │ │ └─13999 /bin/memcached_exporter │ ├─c136d976d57a98afc45606be2a7427cafa7948bd8ac9415e3cd6d30dc923da4a │ │ └─4570 /pause │ ├─14d1b2d65d9b63c5ede9c9548993377d23671bc53b27841250f0de78ba661e53 │ │ └─4457 /pause │ ├─947bf6cc03e819d4043fa2ed7b93fd8113e58590a48fd9902c2a2102b7f9989a │ │ └─7417 /coredns -conf /etc/coredns/Corefile │ ├─1967ee71869f8bd1cace8b49fe13e0dfb2b8f99627f6d2f6a24d386b3a5560eb │ │ └─20461 /pause │ ├─c8048b83c9bc53fca42b5b3fed4addba8b75d4574dde62b316b2a849be406bea │ │ └─18535 /pause │ ├─0be4becf35413aeeb0b048ea769403180f0d059b027a2163da0a1408297638a3 │ │ └─16337 /secretgen-controller │ ├─c367f7278bdba3bee268fc462789c09bc36dee84a573bf3dff9ece43a84e557c │ │ └─11096 /pause │ └─a718fd099ba478a954b8af944bb977a3c77c3d6fdb10efc1b7c102f7ad38f4ab │ ├─6235 cilium-agent --config-dir=/tmp/cilium/config-map │ └─6558 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount