Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─622 /lib/systemd/systemd --user │ │ └─623 (sd-pam) │ ├─session-4.scope │ │ ├─1350 sshd: zuul [priv] │ │ └─1363 sshd: zuul@notty │ └─session-1.scope │ ├─ 619 sshd: zuul [priv] │ ├─ 636 sshd: zuul@notty │ ├─ 773 /usr/bin/python3 │ ├─ 1354 ssh: /home/zuul/.ansible/cp/199.204.45.141-22-zuul [mux] │ ├─37484 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-klsavxqoyihchhdflfbdtxhmfslofega ; /usr/bin/python3'"'"' && sleep 0' │ ├─37485 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-klsavxqoyihchhdflfbdtxhmfslofega ; /usr/bin/python3' && sleep 0 │ ├─37486 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-klsavxqoyihchhdflfbdtxhmfslofega ; /usr/bin/python3 │ ├─37487 /bin/sh -c echo BECOME-SUCCESS-klsavxqoyihchhdflfbdtxhmfslofega ; /usr/bin/python3 │ ├─37488 /usr/bin/python3 │ ├─37489 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37491 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2873 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4423 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id de6a64f060acf3fdfe7d80423fbed8737dbf49b9a393611ff00abe9487a39d60 -address /run/containerd/containerd.sock │ │ ├─ 4436 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5e2c020501c51a128b24a4d04cb96040bde3d8b3c5d2d11e9d0fb2fa2b1d71a6 -address /run/containerd/containerd.sock │ │ ├─ 4471 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fc67323c59dd3927d874a60c9a02b3ce979e740158b1df032fa91b31c8600cf8 -address /run/containerd/containerd.sock │ │ ├─ 4484 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 23ad497068b22fea764d64e8a95a4ef9d525b1f5f71904ccc66a48b199bfd2c7 -address /run/containerd/containerd.sock │ │ ├─ 4513 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9424ff94dabadbe64a4336f491209f10d6682aa349b4d93cae7a29cdfea7ed5b -address /run/containerd/containerd.sock │ │ ├─ 4990 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b7c8f2363d847e6028306bd392a9a5d080dd2b70159ee090abdf786a1e26667a -address /run/containerd/containerd.sock │ │ ├─ 5649 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 91d9440b71bd2173c381b71c65fe4fb2b518a961d648ca9f428769ae3064d51a -address /run/containerd/containerd.sock │ │ ├─ 5681 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8dcc5523f5c810f51a87ac88d6395df600f69e3ab3648eceed432a6fd460a152 -address /run/containerd/containerd.sock │ │ ├─ 6831 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 863ce8e876f3e3b40e4a5276a07f154dbcff554cbf842959785bb31788d81808 -address /run/containerd/containerd.sock │ │ ├─ 7173 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4788392e3064b48930d708600d5e7c1da17ebb2e38df1e860cdbbc69c810658d -address /run/containerd/containerd.sock │ │ ├─ 7212 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5a6c29e199680aba6faa4071e971d89928ebf183e1ecb8b4999a2e2d4d4e9e68 -address /run/containerd/containerd.sock │ │ ├─ 7564 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 78c72a1bf6a02bb333ccf1f12ddb485420e3e76a224cb101c8dbd0bde8889ef7 -address /run/containerd/containerd.sock │ │ ├─ 8054 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 240670d0b394289906ce68232b43f7f08ec606150d4fee43b2ae516d8bff4c80 -address /run/containerd/containerd.sock │ │ ├─ 8093 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f7ae7bc12e4c943e49279e41efec62af752083d318afee0fa29367db139e7492 -address /run/containerd/containerd.sock │ │ ├─ 8133 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7dde68ee440ab51231c8140ab29395a03a289f668e2f2dd290029604b10441a1 -address /run/containerd/containerd.sock │ │ ├─ 9998 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cfff0909862796f978d4e598fbf6d6a63acbf558fa6034f306211b02cb68453b -address /run/containerd/containerd.sock │ │ ├─10057 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b16583b68ad56a3819e0998b14c45bbdc7d4db6d4edbee109120ddefa09fa617 -address /run/containerd/containerd.sock │ │ ├─10676 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5c6367f21560f5df4324e03ddbd0602c6d4b4ad5904247efc08aad0dea8bbf5f -address /run/containerd/containerd.sock │ │ ├─10767 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5bea3b8ffc6b0e04cd88f9e3ddd6d5d03f5921b120825a869b1c9807654912fc -address /run/containerd/containerd.sock │ │ ├─11032 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 62d859306c78dc928d3e944df184db758c28e3305d66666e47570bfd4c8148fa -address /run/containerd/containerd.sock │ │ ├─11412 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 313eaac1817ca86ea4158f474bc05df3cbea546a1f62e7efe969592368b9fc14 -address /run/containerd/containerd.sock │ │ ├─11807 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 19186cd385fe3640a9d8ab19d1a028d8edbcfa47d1cc9f446189c790fd544f0a -address /run/containerd/containerd.sock │ │ ├─13516 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d82fe79c66c0f0b3ee8a3c320f330ed5d3a0340a74439ef8d12db5a12c92e2ac -address /run/containerd/containerd.sock │ │ ├─14147 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a3c65297ff9ef899aa7408f6dfe3ba02d3c0a8f3b0920fecbc58fe1882dc30e9 -address /run/containerd/containerd.sock │ │ ├─17522 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b98d6de828737ce9c15a0c6ef6b6c8fa890cfe4681e205c87fdbf9f5c80b536 -address /run/containerd/containerd.sock │ │ ├─19966 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4a45332897d8d2672a4b7a81f4ff44c4324fec84028792788af2f7be8773306c -address /run/containerd/containerd.sock │ │ ├─20066 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9c69a2a193079a011a10e927df3034b43152376f1312151b8d9938c307ebfa34 -address /run/containerd/containerd.sock │ │ ├─20106 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ada07b16bd0e4cd0131b448e35499e4c3f7b47e4662d113eee423664096dcf84 -address /run/containerd/containerd.sock │ │ ├─20127 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1dba68d3a2a95d168545a320e588340f8c100e8252393744f8d860bd54d390cb -address /run/containerd/containerd.sock │ │ ├─21266 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2dd0599dc660c469d0c51324703b9115031332ea4da62b7cfa002240bd9fe956 -address /run/containerd/containerd.sock │ │ ├─21280 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aa3e7e1d5d9e48099bb5d6250ecac848654ed66d1048ca026bbdd5ec29d9e2c9 -address /run/containerd/containerd.sock │ │ ├─22215 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2e2ca818f2c368007d10c84cef9e892f1ebcf798539d9a570b223536bcad35c7 -address /run/containerd/containerd.sock │ │ ├─23528 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e64cd55de557881806f9b83c256c7cb1ac42f765326b3712e02830ba5f4a9da6 -address /run/containerd/containerd.sock │ │ ├─28904 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0076f498d4f709ebe42271ddc6000090aab3b8c1d07d88887d36074ce49cb0bd -address /run/containerd/containerd.sock │ │ ├─28951 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 165dfbb5e6e44a8b4cfd1d6ff0fac44f8a2dbcbe715d52a86e4f35d5c45f1bb8 -address /run/containerd/containerd.sock │ │ └─29031 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2950c0839d985df4e68c0c02777192ea70729450c57a74d50d2ab3c0083d591d -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1096 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─438 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─329 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─563 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─535 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4852 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.141 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ ├─ 568 sshd: /usr/sbin/sshd -D [listener] 1 of 10-100 startups │ │ ├─37459 sshd: unknown [priv] │ │ └─37460 sshd: unknown [net] │ ├─uuidd.service │ │ └─1279 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─543 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─8dcc5523f5c810f51a87ac88d6395df600f69e3ab3648eceed432a6fd460a152 │ │ └─5712 /pause │ ├─a87f22d4581c5b9c508602e5335375156616b1252aeb5aaea70c4390eddd429c │ │ ├─25721 apache2 -DFOREGROUND │ │ ├─25735 (wsgi:k -DFOREGROUND │ │ ├─25736 (wsgi:k -DFOREGROUND │ │ ├─25737 (wsgi:k -DFOREGROUND │ │ ├─25738 (wsgi:k -DFOREGROUND │ │ ├─25740 apache2 -DFOREGROUND │ │ ├─25741 apache2 -DFOREGROUND │ │ ├─25742 apache2 -DFOREGROUND │ │ ├─25743 apache2 -DFOREGROUND │ │ ├─25745 apache2 -DFOREGROUND │ │ ├─25746 apache2 -DFOREGROUND │ │ ├─25749 apache2 -DFOREGROUND │ │ ├─25750 apache2 -DFOREGROUND │ │ ├─25751 apache2 -DFOREGROUND │ │ └─25753 apache2 -DFOREGROUND │ ├─de6a64f060acf3fdfe7d80423fbed8737dbf49b9a393611ff00abe9487a39d60 │ │ └─4539 /pause │ ├─313eaac1817ca86ea4158f474bc05df3cbea546a1f62e7efe969592368b9fc14 │ │ └─11451 /pause │ ├─cfff0909862796f978d4e598fbf6d6a63acbf558fa6034f306211b02cb68453b │ │ └─10027 /pause │ ├─43b2b5b6f037e36e3ce9f775102afbf456f0bdda5cd54c7929bce63f651dfccc │ │ └─4661 etcd --advertise-client-urls=https://199.204.45.141:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.141:2380 --initial-cluster=instance=https://199.204.45.141:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.141:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.141:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─5c6367f21560f5df4324e03ddbd0602c6d4b4ad5904247efc08aad0dea8bbf5f │ │ └─10698 /pause │ ├─5a6c29e199680aba6faa4071e971d89928ebf183e1ecb8b4999a2e2d4d4e9e68 │ │ └─7236 /pause │ ├─77044b4af523df73eaf28a0a8ecad07c4b3a0b324fd819816021e95a4bf0ecd6 │ │ └─4693 kube-apiserver --advertise-address=199.204.45.141 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─3644e78a51033a27ae4fbbd1cfee9a1cc837b1ecef56a21ef55b8d98cc6514bf │ │ ├─11946 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─14501 haproxy -sf 158 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─91d9440b71bd2173c381b71c65fe4fb2b518a961d648ca9f428769ae3064d51a │ │ └─5686 /pause │ ├─84f559d75ea6df44062c6297eff4650a120596842f7c61289d4d8cbd0fb4cfdd │ │ └─22522 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─2e2ca818f2c368007d10c84cef9e892f1ebcf798539d9a570b223536bcad35c7 │ │ └─22238 /pause │ ├─2deb154049b614d8e93145033a793ecdd949f3ad2ae990aa6c5a2b6b551626fa │ │ ├─6115 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6489 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─188cb1380429eb82d5a3ed7204b85a28e66829f4c112e265431821d4dccc28a7 │ │ └─4695 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─6171a0d70aadda916f03a985ecd7bee611ab88e327660af14fa3868e90fb94c9 │ │ ├─22686 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─22703 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-13.2.2.11/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -enable-feature maybe_expr │ │ ├─22709 erl_child_setup 1048576 │ │ ├─22742 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─22743 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─22753 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/epmd -daemon │ │ └─22870 /bin/sh -s rabbit_disk_monitor │ ├─1dba68d3a2a95d168545a320e588340f8c100e8252393744f8d860bd54d390cb │ │ └─20171 /pause │ ├─c2902fab858279c22d1b26ed1b194bd1473cf6ea11a6e7876dde950fdf953041 │ │ └─11218 percona-xtradb-cluster-operator │ ├─0971de1df5ad65a701226b642bf09cd0413ed3eb445c9a9d97ab43f780b7f2c2 │ │ └─10328 /server │ ├─b7c8f2363d847e6028306bd392a9a5d080dd2b70159ee090abdf786a1e26667a │ │ └─5014 /pause │ ├─78c72a1bf6a02bb333ccf1f12ddb485420e3e76a224cb101c8dbd0bde8889ef7 │ │ └─7587 /pause │ ├─e5038897ad6fafa7657a9f970cf7e96bb1c5380ab78542597e9a4e285594b35c │ │ └─13963 /bin/memcached_exporter │ ├─f7ae7bc12e4c943e49279e41efec62af752083d318afee0fa29367db139e7492 │ │ └─8117 /pause │ ├─9c69a2a193079a011a10e927df3034b43152376f1312151b8d9938c307ebfa34 │ │ └─20091 /pause │ ├─e05db9c44f7c3f26291ab19b1327d5ceef5de10f0ab69cd495939c9eae05750e │ │ └─12086 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─23ad497068b22fea764d64e8a95a4ef9d525b1f5f71904ccc66a48b199bfd2c7 │ │ └─4563 /pause │ ├─ada07b16bd0e4cd0131b448e35499e4c3f7b47e4662d113eee423664096dcf84 │ │ └─20151 /pause │ ├─19186cd385fe3640a9d8ab19d1a028d8edbcfa47d1cc9f446189c790fd544f0a │ │ └─11834 /pause │ ├─11dac5b55dedf4d9a6a7ed8765a196e5071e18986134010a07b399869c50325a │ │ └─13886 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─6b31fad92ce8235af21bf68f15e22980bb43b89aea55b10708cda1ac3cc397a6 │ │ └─22303 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-141.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─f4d0e2a4d94803867ea465f43410ebd1d86e34d4ec5797f7bf54fcb78e040df1 │ │ ├─20874 python -u /app/sidecar.py │ │ ├─21050 python -u /app/sidecar.py │ │ └─21051 python -u /app/sidecar.py │ ├─1fbaecdc99ed8de7b61d4863f9120e3908a9e8c64eec536e0fd1bc6c9f7a5241 │ │ ├─30716 apache2 -DFOREGROUND │ │ ├─32886 (wsgi:h -DFOREGROUND │ │ ├─32887 (wsgi:h -DFOREGROUND │ │ ├─32888 (wsgi:h -DFOREGROUND │ │ ├─32889 (wsgi:h -DFOREGROUND │ │ ├─32890 (wsgi:h -DFOREGROUND │ │ ├─32891 apache2 -DFOREGROUND │ │ └─32892 apache2 -DFOREGROUND │ ├─2d26d2a0bb1eced5c182cebfb6e124b08602e597a4647927d356cd79d458e6e3 │ │ └─8306 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─6c18d08c38c8c4fa23c21f0426512f7eee41f10e306705097ed55377e49091c8 │ │ └─7287 /coredns -conf /etc/coredns/Corefile │ ├─d82fe79c66c0f0b3ee8a3c320f330ed5d3a0340a74439ef8d12db5a12c92e2ac │ │ └─13539 /pause │ ├─478ab7e19c39784718735c8f344bba77df89b2dd506e8a0a70d59b8a9f9bfaa7 │ │ └─22634 /bin/oauth2-proxy │ ├─d0a26b62dbed675a5a8c55ccbe0902a2ee0768891d02570b880a7e2358156b35 │ │ └─21932 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-141.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─aa3e7e1d5d9e48099bb5d6250ecac848654ed66d1048ca026bbdd5ec29d9e2c9 │ │ └─21314 /pause │ ├─4f07b753f04af066f21a6ba724460d478e97505fef72b2fb072de783ecc70f4b │ │ └─10836 /manager --metrics-bind-address=:9782 │ ├─5bea3b8ffc6b0e04cd88f9e3ddd6d5d03f5921b120825a869b1c9807654912fc │ │ └─10790 /pause │ ├─281c90725d48ab1aaf6cc7f4311d75ba8f50b11ccf6f3a1d87367ecf0fa5ad08 │ │ ├─20846 python -u /app/sidecar.py │ │ ├─21048 python -u /app/sidecar.py │ │ └─21049 python -u /app/sidecar.py │ ├─62d859306c78dc928d3e944df184db758c28e3305d66666e47570bfd4c8148fa │ │ └─11056 /pause │ ├─2dd0599dc660c469d0c51324703b9115031332ea4da62b7cfa002240bd9fe956 │ │ └─21326 /pause │ ├─7b98d6de828737ce9c15a0c6ef6b6c8fa890cfe4681e205c87fdbf9f5c80b536 │ │ └─17546 /pause │ ├─006f6308adc5f3950ef077974ab412691feabe0632a9541cbd8eecc8ab08d107 │ │ └─21114 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─3154931541ff4e58b112a85a399372b0145b27daa8ca9eb2f01b72dba6b52d6f │ │ └─20391 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─7dde68ee440ab51231c8140ab29395a03a289f668e2f2dd290029604b10441a1 │ │ └─8161 /pause │ ├─9bd3ecdeb4d184827f891b46bcbbad81212b74d0ca5bbe56783d76210f52484d │ │ └─5051 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─663f39bdbbb88e63979768488b92d30578b2801c1e815bb5bd2f9f43079a3496 │ │ └─17596 /secretgen-controller │ ├─0076f498d4f709ebe42271ddc6000090aab3b8c1d07d88887d36074ce49cb0bd │ │ └─28930 /pause │ ├─573b52960cd05e21e3c9555653e7c2eed763394a7a0acf6141bb4f582766219e │ │ └─20900 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─180394921e2aaed25dfd3696cab458f8e194cdc6a86d069fc5e260807626adf3 │ │ └─22027 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─9424ff94dabadbe64a4336f491209f10d6682aa349b4d93cae7a29cdfea7ed5b │ │ └─4575 /pause │ ├─863ce8e876f3e3b40e4a5276a07f154dbcff554cbf842959785bb31788d81808 │ │ └─6855 /pause │ ├─175d0651c1db7de032d90c407372b74574f0e04083990419cfa7debb4213b676 │ │ └─4726 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─240670d0b394289906ce68232b43f7f08ec606150d4fee43b2ae516d8bff4c80 │ │ └─8078 /pause │ ├─671ca7dbf8512759acc152bab07e8479d357777e06f3c23dc528434f3b64690c │ │ └─22477 /bin/oauth2-proxy │ ├─618abbaade7452f61765976e11f82cf97b701f1bb2afacdf9d33a07d3ffc60ea │ │ └─4807 /kube-vip manager │ ├─609d41e707fa7e655b89a3248ab3769e3feb5b72d2c8feeedfc6df803fd3ad1a │ │ └─5911 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─bf5138d8edcb2d2595fd59aaf96b71f7507806cc50d94ee820876a4bd0b7cb9d │ │ └─22337 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─3ddd6dcd46207fe8389a933a4517c8559b4f18105d0cd0f26ca94f3db51a43cd │ │ ├─10284 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10296 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10425 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30089 nginx: worker process │ │ ├─30090 nginx: worker process │ │ └─30091 nginx: cache manager process │ ├─495f54100e7c8d8120f525e49cb56770a8a690f1613edcdc8bf8fbb12e3c0efd │ │ └─21492 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─27e9e90264bb6f34e3b5f74bbe8f874e4b17cb6e131b4ad4dd78eae6aa94359c │ │ ├─11989 mysqld --wsrep_start_position=f26fa441-3b05-11f1-98b7-9af47f858a09:20 │ │ └─12114 /var/lib/mysql/mysql-state-monitor │ ├─e64cd55de557881806f9b83c256c7cb1ac42f765326b3712e02830ba5f4a9da6 │ │ └─23553 /pause │ ├─91116df5220bb03d7e1439516b2048092921f2d634b0821b00a70d77d4f346d7 │ │ └─8347 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─07e47649d36ed4ca636885b7457e5ee0dc10f805b06e779ac6ee52d1ba0db3b2 │ │ └─11136 /manager --metrics-bind-address=:8080 │ ├─418dac616ee29b97d32febc5355833da0fb51c5be36c0118ae2a9c8c64cbfa66 │ │ └─14251 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─2950c0839d985df4e68c0c02777192ea70729450c57a74d50d2ab3c0083d591d │ │ └─29055 /pause │ ├─5e2c020501c51a128b24a4d04cb96040bde3d8b3c5d2d11e9d0fb2fa2b1d71a6 │ │ └─4490 /pause │ ├─a3c65297ff9ef899aa7408f6dfe3ba02d3c0a8f3b0920fecbc58fe1882dc30e9 │ │ └─14171 /pause │ ├─78608d7df7b242b6c4820f1e1fc46539f5314637eeab6457f37856d15a3c66ea │ │ └─6901 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─4788392e3064b48930d708600d5e7c1da17ebb2e38df1e860cdbbc69c810658d │ │ └─7202 /pause │ ├─12809f04bd0a68396806db438e0eaf89013ae9a4469b830838beb3b647367318 │ │ └─7695 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─4a45332897d8d2672a4b7a81f4ff44c4324fec84028792788af2f7be8773306c │ │ └─19994 /pause │ ├─d44f5fb9bb11353ee4ea434d17642e51d6aae11cd7c9fe4a3f202c4cf959f020 │ │ └─12182 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─ebfd97c2b2c0bcfe028fb8f9cb1540bf0edd634ca2943ced022e0b1489c280b9 │ │ └─7268 /coredns -conf /etc/coredns/Corefile │ ├─541ac4a2e40099fe0e5f5b5987b17729f627c36dd69ae9d94cd16114dd20e494 │ │ └─8266 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─165dfbb5e6e44a8b4cfd1d6ff0fac44f8a2dbcbe715d52a86e4f35d5c45f1bb8 │ │ └─28989 /pause │ ├─6e91d66656fd09ebb49d72ca2ebc4c596d713d06d08db8be5dcc699c7d2debe4 │ │ ├─30292 apache2 -DFOREGROUND │ │ ├─32694 (wsgi:h -DFOREGROUND │ │ ├─32695 (wsgi:h -DFOREGROUND │ │ ├─32696 (wsgi:h -DFOREGROUND │ │ ├─32697 (wsgi:h -DFOREGROUND │ │ ├─32698 (wsgi:h -DFOREGROUND │ │ ├─32699 apache2 -DFOREGROUND │ │ └─32700 apache2 -DFOREGROUND │ ├─fc67323c59dd3927d874a60c9a02b3ce979e740158b1df032fa91b31c8600cf8 │ │ └─4594 /pause │ ├─b4bcb996abec52d01fab731df2c73d8db93d1b8852c2f5058c8c5d05d978a757 │ │ └─22373 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─7a1973c9e21e44de6a7b63672ee24bbde333c69f78c44091426841116a24a7e1 │ │ ├─30268 apache2 -DFOREGROUND │ │ ├─32772 (wsgi:h -DFOREGROUND │ │ ├─32773 (wsgi:h -DFOREGROUND │ │ ├─32774 (wsgi:h -DFOREGROUND │ │ ├─32775 (wsgi:h -DFOREGROUND │ │ ├─32776 (wsgi:h -DFOREGROUND │ │ ├─32777 apache2 -DFOREGROUND │ │ └─32778 apache2 -DFOREGROUND │ └─b16583b68ad56a3819e0998b14c45bbdc7d4db6d4edbee109120ddefa09fa617 │ └─10081 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount