Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-4.scope │ │ ├─1350 sshd: zuul [priv] │ │ └─1363 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 633 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1354 ssh: /home/zuul/.ansible/cp/199.19.213.118-22-zuul [mux] │ ├─18208 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-emrbghhkduzixqcoedbdkwkgqxuzjtqk ; /usr/bin/python3'"'"' && sleep 0' │ ├─18209 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-emrbghhkduzixqcoedbdkwkgqxuzjtqk ; /usr/bin/python3' && sleep 0 │ ├─18210 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-emrbghhkduzixqcoedbdkwkgqxuzjtqk ; /usr/bin/python3 │ ├─18211 /bin/sh -c echo BECOME-SUCCESS-emrbghhkduzixqcoedbdkwkgqxuzjtqk ; /usr/bin/python3 │ ├─18212 /usr/bin/python3 │ ├─18224 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─18226 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2871 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4428 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3265bb80c876c87162923b05c8829bb2b6e3c61a80aff82c54cce55352fdefd9 -address /run/containerd/containerd.sock │ │ ├─ 4449 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8b491c154d31a20e9dc4bf3d7ba0b883aaad260d7009f42205411db11bb2cf81 -address /run/containerd/containerd.sock │ │ ├─ 4489 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c14329bfb6136faeffc333d2549032de5ad168f40c23d627da8fd50f41d45315 -address /run/containerd/containerd.sock │ │ ├─ 4518 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5091b9ca7cfc2a8a45b4f0294440e64d5ae1c3b7e4481dc32628ca7db52dec2d -address /run/containerd/containerd.sock │ │ ├─ 4520 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ec5cdd9b88efbe9035136c07451eea791aa8d4595618ff1a1255347ae151bd2f -address /run/containerd/containerd.sock │ │ ├─ 5016 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0c4d3089f5997ad710aec7d1459ec0b110b298e1a991538aeb463e13249605ba -address /run/containerd/containerd.sock │ │ ├─ 5648 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 45c2548f50b0ee96fd196294cda9f825aec95f20437d7cf29b5cfaf2a66ee2b3 -address /run/containerd/containerd.sock │ │ ├─ 5667 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 763d69870b0dd64d66ba370027171f0b933eff71d4296fd6b08cda9e2e734970 -address /run/containerd/containerd.sock │ │ ├─ 7060 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1e9ac3fd337cbb36bb02d520636d0e3389c82d4ea18ffd8ae8fd25d91dac942f -address /run/containerd/containerd.sock │ │ ├─ 7409 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 68b1fbf747095db7eb88de3a27aa57056be82644f0697560d6c7958f0a49d2cd -address /run/containerd/containerd.sock │ │ ├─ 7447 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3c926bec1acaffb1fdcec3b5cbfc30e8eaf87f2d908113e1e1b2ea8506fd045e -address /run/containerd/containerd.sock │ │ ├─ 7820 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cebb8795a00c66d081c9847b8fa6658ae44395aa4975e03390f2ea0f719160bb -address /run/containerd/containerd.sock │ │ ├─ 8267 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bbfe5b29be911bbc310c55e2e3d5999701fe7bac19cf13d4d466a00f3111fc33 -address /run/containerd/containerd.sock │ │ ├─ 8306 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 65b5ab2d4bd8f9814d04e5511acfafd35dbdcd80007b2c55b63c1bd5b1b4f5f2 -address /run/containerd/containerd.sock │ │ ├─ 8351 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 491b99c25b167d6d84318c3803aa170f2e35caa585ad404f13aa65fe4214d13d -address /run/containerd/containerd.sock │ │ ├─10504 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7d4eb499fa7bf855e4449f6671e4c072b50fd0f3af797656733868b9029a99ea -address /run/containerd/containerd.sock │ │ ├─10576 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f5c8b1e1eba310bcd34b6659df168ce10c3fd9f226463989941ea156add59a9c -address /run/containerd/containerd.sock │ │ ├─11234 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 02b18f7cea1065bf88490c341bb481b82e5dec8deba6b6b5232950ee3701b3f0 -address /run/containerd/containerd.sock │ │ ├─11277 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7f629a8c0b69694509cfab3333f17457962fa6181622705fd90756e19f1b415e -address /run/containerd/containerd.sock │ │ ├─11608 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b4241344481928087b1f744d8b46ed1eb55737f84e639c5e5b4257de48b5908b -address /run/containerd/containerd.sock │ │ ├─11894 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 64d32f04648bb0e8d2f98087ef10bc1dfb1bfa9f6190e86e5024890e0b601c42 -address /run/containerd/containerd.sock │ │ ├─12424 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1bebbc04f4df31bd67e22c60a582c6a9fc2bffa8f41dab2d8663478e1f45e640 -address /run/containerd/containerd.sock │ │ ├─14000 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f0a4cf05701ec6c16b3364d221540d8feb3445e9a3d2dc16fd41f8dc419e8f8d -address /run/containerd/containerd.sock │ │ ├─14646 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 24401187eeabf68bd41676fb9de031f25c23944399728e84bb91dba5d97bad74 -address /run/containerd/containerd.sock │ │ └─18008 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c7f9c04ac9084e2b2a6b7e3ec726a2c4de22b6e5256e6b686c8da6e463092eb4 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1091 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─328 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─541 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─559 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─531 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4865 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.118 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ ├─ 565 sshd: /usr/sbin/sshd -D [listener] 2 of 10-100 startups │ │ ├─17739 sshd: unknown [priv] │ │ ├─17740 sshd: unknown [net] │ │ ├─17926 sshd: unknown [priv] │ │ └─17927 sshd: unknown [net] │ ├─uuidd.service │ │ └─1285 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─528 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─537 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─534 /lib/systemd/systemd-logind ├─k8s.io │ ├─0c4d3089f5997ad710aec7d1459ec0b110b298e1a991538aeb463e13249605ba │ │ └─5041 /pause │ ├─3c926bec1acaffb1fdcec3b5cbfc30e8eaf87f2d908113e1e1b2ea8506fd045e │ │ └─7472 /pause │ ├─df8bde3e33bfe01e350b57fcfc0211f3006c1c317008a5f40cdf64f9c97566f4 │ │ └─5066 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─8b491c154d31a20e9dc4bf3d7ba0b883aaad260d7009f42205411db11bb2cf81 │ │ └─4539 /pause │ ├─989940f71195bdacaacc16aafdf8b062eb4fb8c7fa2f04fd26ed1313fa8f47af │ │ ├─6349 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6713 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─24401187eeabf68bd41676fb9de031f25c23944399728e84bb91dba5d97bad74 │ │ └─14671 /pause │ ├─b8d79939e73852d9ef73d33efef66d8b1dbe735337a483684520dce926b04bbb │ │ └─7540 /coredns -conf /etc/coredns/Corefile │ ├─68b1fbf747095db7eb88de3a27aa57056be82644f0697560d6c7958f0a49d2cd │ │ └─7431 /pause │ ├─491b99c25b167d6d84318c3803aa170f2e35caa585ad404f13aa65fe4214d13d │ │ └─8380 /pause │ ├─0a94bea5f419a364a5d5ad57a4475d8dd75e6fbcfec2b49c4b0eea3e6714e9e7 │ │ └─11468 /manager --metrics-bind-address=:8080 │ ├─e1978ce3729d33a685b04fc5084082b3715f44895635504ba8a1c8c8dfc4381e │ │ ├─10807 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10821 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10950 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─18072 nginx: worker process │ │ ├─18073 nginx: worker process │ │ └─18074 nginx: cache manager process │ ├─2df020a8c81f14f21e66d8bfb5cf164a70a9d4a77d31a4d7c634e196fd91d784 │ │ └─4713 kube-apiserver --advertise-address=199.19.213.118 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─65b5ab2d4bd8f9814d04e5511acfafd35dbdcd80007b2c55b63c1bd5b1b4f5f2 │ │ └─8331 /pause │ ├─a66002d6a21109ab46c46256961860b4f9572481df3e026cc89461f66c13e717 │ │ └─8485 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─6269f0d4c4a994ca3d6748c576a54f59122857abf70ba0c40381ed1642e172d4 │ │ └─12546 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─d1926d4574a80909a17edc74e9cf8cd66dae8f6464f8387fc2787754baa9fdf3 │ │ └─11373 /manager --metrics-bind-address=:9782 │ ├─763d69870b0dd64d66ba370027171f0b933eff71d4296fd6b08cda9e2e734970 │ │ └─5717 /pause │ ├─070f4929a71fefa2b7b4afd8150d98e2f1e7ff525b010e778038bcdf479e8e2c │ │ └─14353 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─cebb8795a00c66d081c9847b8fa6658ae44395aa4975e03390f2ea0f719160bb │ │ └─7846 /pause │ ├─45c2548f50b0ee96fd196294cda9f825aec95f20437d7cf29b5cfaf2a66ee2b3 │ │ └─5703 /pause │ ├─37cdc133c21c004e60db51ebed53e6620060dc9037f2485fd0b3d750cfdecc00 │ │ └─10872 /server │ ├─3d99601d656371c435b6db2ef553f5ec6c87fd198ebc905c84df0539444eb1ae │ │ └─4738 etcd --advertise-client-urls=https://199.19.213.118:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.118:2380 --initial-cluster=instance=https://199.19.213.118:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.118:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.118:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─279f0a8054114dfee2388ac758b99f97855c978b955013a610a65077df0d5f3e │ │ └─11756 percona-xtradb-cluster-operator │ ├─b14252bb48be95f87494c91c1e9f3d789d40be9798f935cce5deb5a38e913479 │ │ ├─12624 mysqld --wsrep_start_position=5e9eadb9-3ca1-11f1-94a8-2793291d3cb7:20 │ │ └─12716 /var/lib/mysql/mysql-state-monitor │ ├─02b18f7cea1065bf88490c341bb481b82e5dec8deba6b6b5232950ee3701b3f0 │ │ └─11261 /pause │ ├─efe778ab745e78a591d5a496e312864aba4eb53cc2fc99eea4479341505703d3 │ │ └─12774 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─ec5cdd9b88efbe9035136c07451eea791aa8d4595618ff1a1255347ae151bd2f │ │ └─4583 /pause │ ├─8813849bcfab70986a5ce1e215a72cbeb00295a8a8b15926856f1111c5dc7745 │ │ └─4719 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─5091b9ca7cfc2a8a45b4f0294440e64d5ae1c3b7e4481dc32628ca7db52dec2d │ │ └─4603 /pause │ ├─96c153dcfa9dd86df24e3aeec48c893ca9a118edcfa2e5f896c1d2ad4741479b │ │ └─7964 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─c7f9c04ac9084e2b2a6b7e3ec726a2c4de22b6e5256e6b686c8da6e463092eb4 │ │ └─18033 /pause │ ├─64d32f04648bb0e8d2f98087ef10bc1dfb1bfa9f6190e86e5024890e0b601c42 │ │ └─11921 /pause │ ├─1e9ac3fd337cbb36bb02d520636d0e3389c82d4ea18ffd8ae8fd25d91dac942f │ │ └─7085 /pause │ ├─b4241344481928087b1f744d8b46ed1eb55737f84e639c5e5b4257de48b5908b │ │ └─11632 /pause │ ├─630cd605d8db9e2b5d3b96ee7e87755c29d7602fbc3570ac682470e07e0b0eb6 │ │ └─14406 /bin/memcached_exporter │ ├─8781e676536ff7f14c3009ee63609a22d2eea3dfec7ec450b1366974c28948cd │ │ └─7509 /coredns -conf /etc/coredns/Corefile │ ├─1bebbc04f4df31bd67e22c60a582c6a9fc2bffa8f41dab2d8663478e1f45e640 │ │ └─12448 /pause │ ├─2dc4e1953ac73e0588b28a86c265f5747e28eb733af0b67a3b8457d975bada80 │ │ └─4812 /kube-vip manager │ ├─43a82606dd72556e86a30e8699f0cd0d52e1ce946ada95efbf18f551b32c1c72 │ │ └─4670 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─7f629a8c0b69694509cfab3333f17457962fa6181622705fd90756e19f1b415e │ │ └─11301 /pause │ ├─3265bb80c876c87162923b05c8829bb2b6e3c61a80aff82c54cce55352fdefd9 │ │ └─4494 /pause │ ├─cab2add9aff69c1e73d7b06c63ac78df9d0ec645d1f3c5a2be2edc9b0f7a6dd2 │ │ └─18152 /secretgen-controller │ ├─d802999fa5cded0ad29c109f5c930c71a1006001bef0278d0e63469c326816d7 │ │ └─14753 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─3493dc6fb2a8538b54eef68953a0b7f28a51318a78cb6bc94832d04ad7c645bd │ │ └─7119 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─01414f15fa7e688b03789d027c25c0862159f0c5fff35e9f6322630a98a8ff13 │ │ └─6151 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─f0a4cf05701ec6c16b3364d221540d8feb3445e9a3d2dc16fd41f8dc419e8f8d │ │ └─14024 /pause │ ├─d1a44cc94b6ef664e80f43c0ed896b7132ebc5fc062ece578e25c1e63b4afca1 │ │ ├─12474 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─15021 haproxy -sf 133 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─f5c8b1e1eba310bcd34b6659df168ce10c3fd9f226463989941ea156add59a9c │ │ └─10600 /pause │ ├─c14329bfb6136faeffc333d2549032de5ad168f40c23d627da8fd50f41d45315 │ │ └─4602 /pause │ ├─7d4eb499fa7bf855e4449f6671e4c072b50fd0f3af797656733868b9029a99ea │ │ └─10533 /pause │ ├─bbfe5b29be911bbc310c55e2e3d5999701fe7bac19cf13d4d466a00f3111fc33 │ │ └─8291 /pause │ ├─e023df08b1774b3698a8888b0e9cfda6c59bb06fb3f2bad61804633280bbd882 │ │ └─8558 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ └─d04a645c0f974954621eb9c3730bc68789ba1436a77d27d6dc6e371d271b0935 │ └─8522 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount