Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-4.scope │ │ ├─1357 sshd: zuul [priv] │ │ └─1370 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 633 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1361 ssh: /home/zuul/.ansible/cp/199.204.45.122-22-zuul [mux] │ ├─43316 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-skddoitcqxjwbuycbzzfomeiiqxksgxa ; /usr/bin/python3'"'"' && sleep 0' │ ├─43317 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-skddoitcqxjwbuycbzzfomeiiqxksgxa ; /usr/bin/python3' && sleep 0 │ ├─43318 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-skddoitcqxjwbuycbzzfomeiiqxksgxa ; /usr/bin/python3 │ ├─43319 /bin/sh -c echo BECOME-SUCCESS-skddoitcqxjwbuycbzzfomeiiqxksgxa ; /usr/bin/python3 │ ├─43320 /usr/bin/python3 │ ├─43340 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─43342 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2878 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4451 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9aa70ba566e8284fd6cc5e28018a67fe60152e08577f2048409b04ad2e600538 -address /run/containerd/containerd.sock │ │ ├─ 4485 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3545b596f074e2c1a343bd94540a554e6ae6e150698a7d711f99613ba9d3de14 -address /run/containerd/containerd.sock │ │ ├─ 4487 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e77e3f24f911e20c8afdfd5a2f775725d7734a229184579fc6a966f738fef2bd -address /run/containerd/containerd.sock │ │ ├─ 4511 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3e7f3d695e039f28e9628a79c27a97c85f7f1ed9b95b1e40e49d3283f878e8d7 -address /run/containerd/containerd.sock │ │ ├─ 4539 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ed7add15151bef5cb9c0a1f70c61f99326be96b39299189ca4005e7a778133a1 -address /run/containerd/containerd.sock │ │ ├─ 5014 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 791a4abf58e22fe56ea1c1adfb09d17917fcbb8546fab127bc57127c3550a758 -address /run/containerd/containerd.sock │ │ ├─ 5695 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b90f55a174469458828701914fa57395df3b782137bb131e9649817769384f7b -address /run/containerd/containerd.sock │ │ ├─ 5714 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bdbac7c10a02788e87f8b806b04a9e76fb07434b8ad705a57e07b3ed7efdae0e -address /run/containerd/containerd.sock │ │ ├─ 6896 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1f5b46ae97d90c1dea42682649a91b389740b3bbb22fff86df4fd6bc5d91bfcf -address /run/containerd/containerd.sock │ │ ├─ 7242 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5ca2b9b7bf1aafaeb7822571498063e73b49a5f6fa7f2c1f7d7f58aa013af9bc -address /run/containerd/containerd.sock │ │ ├─ 7286 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 547f5b00c8f91c2a34768aa4679708ca2f2f1ba0e84814a767f42ca6a866fb68 -address /run/containerd/containerd.sock │ │ ├─ 7638 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 253b176b8312a3c0744e3bd63b2c5fb576d6d6d155880ffe19e712f8d4390c11 -address /run/containerd/containerd.sock │ │ ├─ 8096 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 05937e7eaa3089a87f75450e5380278ac7e6c94a2b966dc8b466b2d06ea33337 -address /run/containerd/containerd.sock │ │ ├─ 8139 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d488bca5815d5557608cffb9928f0a0c7ad976456371cfccd6161c57440803ce -address /run/containerd/containerd.sock │ │ ├─ 8177 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 078fc0b99d802e9150bf720db5f5e1e01702bb78a5fad5ea67665c9cc3dc8baf -address /run/containerd/containerd.sock │ │ ├─10345 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id edd52900e70a6ad7d555a9148886f843c2b3651fe3ddfaad22a048d30d1c334f -address /run/containerd/containerd.sock │ │ ├─10431 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 77c8e1bfffc33b81b7d8a6c86f2c14524673e2d550eee3b50c6604985b1af3a9 -address /run/containerd/containerd.sock │ │ ├─11246 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 71f84b0c5c071e0e9b4eba79b7db8c5d5adb0724843960301db7358c2123a841 -address /run/containerd/containerd.sock │ │ ├─11344 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5a84c672d78e1e834022306752de48262b9d39ca032fa240adecebfad2ee91b4 -address /run/containerd/containerd.sock │ │ ├─11623 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0c5b333a74f9515f92154d8e319229782122d0d0ed7c94330efd25e194dd7cb6 -address /run/containerd/containerd.sock │ │ ├─11895 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1a476b71c44e2d5465b3dea7da5bd24f098e3bc79c6cd454c530d4a0550b9ee8 -address /run/containerd/containerd.sock │ │ ├─12281 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 24f2d84530ab694e44094e9db2b3a2ed5f8a22a57ae07fa12ccf8b8f3a1663a8 -address /run/containerd/containerd.sock │ │ ├─14198 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 09bee9dd722488ca51b37493288c3ee8bb63c2193f4be799783b2b58cc329560 -address /run/containerd/containerd.sock │ │ ├─14846 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b77cfa6f819aac0a3edd2970e35f8484c7d7c008e188cf1cc393e997e068bb45 -address /run/containerd/containerd.sock │ │ ├─18594 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d09a54fc5745bad90e6b69b844331c727a18907bccd14d048d3da40abb54f296 -address /run/containerd/containerd.sock │ │ ├─21268 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 88fa82c570aab08eccd8ead20eefe150325044777592bd1d9ee8d4f6743c92bc -address /run/containerd/containerd.sock │ │ ├─21361 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5f2caf8a225dd3dd8980577cd82121c23e6b89c19df169c79f3ad8834c61ab9d -address /run/containerd/containerd.sock │ │ ├─21418 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d5969d747bc6eae7db81a5156432ab02b14037234806cbcd81846dbd7f52c36d -address /run/containerd/containerd.sock │ │ ├─21457 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 08d6440e3af6e6fc4be43942da97b670e91bd613ee8a6c7625760d61dd77f650 -address /run/containerd/containerd.sock │ │ ├─22503 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fb9b6aa9dd25bc3ac36e4aa48bcc9ad155b777c26b885e02b6d5c00d86c21fa3 -address /run/containerd/containerd.sock │ │ ├─22578 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c3572f893a68baad2d2a2ceba2040e8359539b34400d1f05bbc79202bff44b6f -address /run/containerd/containerd.sock │ │ ├─23567 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eb299fc7e32e03bfa3223f6ce207a9d6fc440d0d8d70e24f173ab14dee056a20 -address /run/containerd/containerd.sock │ │ ├─25117 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 56f8f13f6647f5cd05a2086e77bae0e708aabde7325c823e37ef109ebbbd7059 -address /run/containerd/containerd.sock │ │ ├─30518 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 86c90f007f6198409bd3bf4963a9ce3b95dcad9d46b3b9cf8ea8696b6973af3c -address /run/containerd/containerd.sock │ │ ├─30641 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 01fa40e88bf992788adce4aa872903a6cc53180f4f845820721a9ecb3e2db9c2 -address /run/containerd/containerd.sock │ │ └─30680 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c7fb15eb85276cb778859f0330130eab169de017cc0591ebd7f519bf1a8ac325 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1094 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─440 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─329 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─542 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─561 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─535 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4891 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.122 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─566 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1290 /usr/sbin/uuidd --socket-activation │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─532 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─541 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─538 /lib/systemd/systemd-logind ├─k8s.io │ ├─71f84b0c5c071e0e9b4eba79b7db8c5d5adb0724843960301db7358c2123a841 │ │ └─11269 /pause │ ├─9a1bc4924bfa6cdb9bdae8553997750d3cd2dc3ba543fb0493fec5dc4e00da8f │ │ └─4735 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─9aa70ba566e8284fd6cc5e28018a67fe60152e08577f2048409b04ad2e600538 │ │ └─4538 /pause │ ├─86c90f007f6198409bd3bf4963a9ce3b95dcad9d46b3b9cf8ea8696b6973af3c │ │ └─30541 /pause │ ├─9204df181c0ff7129606c798ab345277ebd1e900d836b07e80df3914c16230fa │ │ └─14577 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─e77e3f24f911e20c8afdfd5a2f775725d7734a229184579fc6a966f738fef2bd │ │ └─4598 /pause │ ├─24ec05aeb7d5f3132fd800f83f9c894866c4a5fcf02a7ca477027a5c469ec495 │ │ └─6955 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─8b10966acd4da99a960547e87e1af71b8232249d0d2d06b0525582ff67f6abbb │ │ └─8301 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─b9e61a1774aa25fe07c23e6a39dcbbc25349addbd363670f1629704ed42079e1 │ │ ├─6158 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6534 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─7529e6f2279eb74b7c914499e40ee87b73b76fc5304be86a6956156b2f850815 │ │ └─7715 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─c7fb15eb85276cb778859f0330130eab169de017cc0591ebd7f519bf1a8ac325 │ │ └─30724 /pause │ ├─300fc4758b8a9770d916e102f7aa800e3b9434594074c967b5bb33f0052ebe19 │ │ └─23888 /bin/oauth2-proxy │ ├─0c5b333a74f9515f92154d8e319229782122d0d0ed7c94330efd25e194dd7cb6 │ │ └─11647 /pause │ ├─eb21572c4078d22c6587fa9068f4c700b4e201753c02b3216179a7f0ee98917b │ │ ├─42581 /bin/bash /tmp/horizon.sh start │ │ └─43339 python /tmp/manage.py compilemessages │ ├─1649729135557f6885a52cfd912460f4420dcf17be53c9fccaca3e3c2caa0a4b │ │ ├─12506 mysqld --wsrep_start_position=76517f9b-3493-11f1-bda2-972d4271d856:20 │ │ └─12630 /var/lib/mysql/mysql-state-monitor │ ├─b77cfa6f819aac0a3edd2970e35f8484c7d7c008e188cf1cc393e997e068bb45 │ │ └─14871 /pause │ ├─5eb583b9e6c94441808ed800e86baa7b5be216e947670364aac6d6f902cddb07 │ │ └─5958 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─4f6636b368fb6fc08045e24b7730608b695283ece76f6c2191f3048467e7535b │ │ └─23412 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-122.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─77c8e1bfffc33b81b7d8a6c86f2c14524673e2d550eee3b50c6604985b1af3a9 │ │ └─10454 /pause │ ├─ed9401b3cc4b6488467fa649f6c6d80f24dc9a8b4a13b2c579bfd67e94d8d211 │ │ └─11771 percona-xtradb-cluster-operator │ ├─55f42262b9b81bb2a5cd3f35dcba6df9ad7f2c3bc646910ec3e1356aa08470b9 │ │ └─4723 kube-apiserver --advertise-address=199.204.45.122 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─5f2caf8a225dd3dd8980577cd82121c23e6b89c19df169c79f3ad8834c61ab9d │ │ └─21385 /pause │ ├─6270f2a19dff27227bf42c61263c209b970dcf376c52e7fd3a20eeafe5ddde33 │ │ ├─24015 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─24042 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─24048 erl_child_setup 1048576 │ │ ├─24083 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─24084 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─24094 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─24166 /bin/sh -s rabbit_disk_monitor │ ├─a40f7cd713100f3bcfec9c05f423d4e9a56e9d155b904ad598a917e44f7220d0 │ │ └─10706 /server │ ├─d09a54fc5745bad90e6b69b844331c727a18907bccd14d048d3da40abb54f296 │ │ └─18615 /pause │ ├─253b176b8312a3c0744e3bd63b2c5fb576d6d6d155880ffe19e712f8d4390c11 │ │ └─7663 /pause │ ├─f2029258c158d133918e77c4e7ccd40a524465d18251ff4aa22c26f9b330baf5 │ │ └─4693 etcd --advertise-client-urls=https://199.204.45.122:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.122:2380 --initial-cluster=instance=https://199.204.45.122:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.122:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.122:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─bdbac7c10a02788e87f8b806b04a9e76fb07434b8ad705a57e07b3ed7efdae0e │ │ └─5758 /pause │ ├─50f878d85cd2edd61c7ff7e2f6456d24bfb7f53795be5e237ab6847d9cb23480 │ │ └─11492 /manager --metrics-bind-address=:8080 │ ├─663511299b567de437d424cc2aa3db3dcc449551a2ccf1e656b11f09ce3738a8 │ │ └─23649 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─ffa1a495bb3f0a745838dec41918d98d7c6611a1a5839818c3a003bba2e16c87 │ │ ├─27372 apache2 -DFOREGROUND │ │ ├─27395 (wsgi:k -DFOREGROUND │ │ ├─27396 (wsgi:k -DFOREGROUND │ │ ├─27397 (wsgi:k -DFOREGROUND │ │ ├─27398 (wsgi:k -DFOREGROUND │ │ ├─27401 apache2 -DFOREGROUND │ │ ├─27402 apache2 -DFOREGROUND │ │ ├─27404 apache2 -DFOREGROUND │ │ ├─27406 apache2 -DFOREGROUND │ │ ├─27407 apache2 -DFOREGROUND │ │ ├─27409 apache2 -DFOREGROUND │ │ ├─27410 apache2 -DFOREGROUND │ │ ├─27411 apache2 -DFOREGROUND │ │ ├─27412 apache2 -DFOREGROUND │ │ └─27413 apache2 -DFOREGROUND │ ├─0b19172be95bf3bfc096ab7ec52f083c12095b545d227772cb7d2b50f6e88ba6 │ │ └─23281 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─49e9fd38ad94f0dbec6ee88f0fcdc60c6242016c5ac73f08ba698d52f98d57ac │ │ └─23617 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-122.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─05937e7eaa3089a87f75450e5380278ac7e6c94a2b966dc8b466b2d06ea33337 │ │ └─8119 /pause │ ├─078fc0b99d802e9150bf720db5f5e1e01702bb78a5fad5ea67665c9cc3dc8baf │ │ └─8202 /pause │ ├─340b483e47810d973811bad264d7a2d4395678df11e6a0e55b58b5fea6ba9e45 │ │ └─12606 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─7e9f6129de59b684002e9255122f4ef8d0f3968af3d4bd8961b213bb02b40fe8 │ │ └─22998 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─cd4b6d12a668f0130c1c45db84c3ec893bf5390654ed55d2ff5d81d275756355 │ │ ├─10660 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10673 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10764 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─31670 nginx: worker process │ │ ├─31671 nginx: worker process │ │ └─31672 nginx: cache manager process │ ├─8644258397a23364f74b6b49489bd07b622d0326165809f812563562b19256c1 │ │ ├─22183 python -u /app/sidecar.py │ │ ├─22422 python -u /app/sidecar.py │ │ └─22423 python -u /app/sidecar.py │ ├─9bd176b71b9f64542a8e2a64f31fbfb8f0d2ff6a9d87a401baadd241c239ba5d │ │ └─14628 /bin/memcached_exporter │ ├─3e7f3d695e039f28e9628a79c27a97c85f7f1ed9b95b1e40e49d3283f878e8d7 │ │ └─4596 /pause │ ├─064e39c754b55e61826a9b966656835ede169f237fe04068d2f36f6eba975cc1 │ │ └─21765 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─09bee9dd722488ca51b37493288c3ee8bb63c2193f4be799783b2b58cc329560 │ │ └─14222 /pause │ ├─49255fefcff79e175dfb2cc8b2c6aa8f4baf2885925ca22eef3866475a64ceeb │ │ └─22367 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─889554ae798b16b50d7a990f575f7c9e7b4fea98995e57f39eb044e6e3c707af │ │ └─18666 /secretgen-controller │ ├─24f2d84530ab694e44094e9db2b3a2ed5f8a22a57ae07fa12ccf8b8f3a1663a8 │ │ └─12305 /pause │ ├─c3572f893a68baad2d2a2ceba2040e8359539b34400d1f05bbc79202bff44b6f │ │ └─22603 /pause │ ├─bf70d5bc66b4f297d414ef6b5bed3fc49dc38323139be6b1fbfdfe382a047694 │ │ └─7328 /coredns -conf /etc/coredns/Corefile │ ├─5417a7388558c17ce5c47ea12ab4f1e1f401faf7b7c3e09bd78b91d4e9b79534 │ │ └─22629 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─e207528dbf4e12d14261f7f2e864b5bddefcfb67185c20e5760a328fd1c9f988 │ │ └─8380 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─1a476b71c44e2d5465b3dea7da5bd24f098e3bc79c6cd454c530d4a0550b9ee8 │ │ └─11920 /pause │ ├─76b31de840ab07678a7d4efad7e6701ac2458f820f480571fd83d2272170daa0 │ │ └─8340 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─08d6440e3af6e6fc4be43942da97b670e91bd613ee8a6c7625760d61dd77f650 │ │ └─21479 /pause │ ├─ca1eab04069d29172f1118e064127825e857471c1de6ecf30bef6438232f4d29 │ │ └─4846 /kube-vip manager │ ├─fb9b6aa9dd25bc3ac36e4aa48bcc9ad155b777c26b885e02b6d5c00d86c21fa3 │ │ └─22526 /pause │ ├─56f8f13f6647f5cd05a2086e77bae0e708aabde7325c823e37ef109ebbbd7059 │ │ └─25140 /pause │ ├─547f5b00c8f91c2a34768aa4679708ca2f2f1ba0e84814a767f42ca6a866fb68 │ │ └─7310 /pause │ ├─b90f55a174469458828701914fa57395df3b782137bb131e9649817769384f7b │ │ └─5739 /pause │ ├─791a4abf58e22fe56ea1c1adfb09d17917fcbb8546fab127bc57127c3550a758 │ │ └─5038 /pause │ ├─01fa40e88bf992788adce4aa872903a6cc53180f4f845820721a9ecb3e2db9c2 │ │ └─30666 /pause │ ├─5a84c672d78e1e834022306752de48262b9d39ca032fa240adecebfad2ee91b4 │ │ └─11367 /pause │ ├─b54dd00945485f624fb76a80ab8b4291a718cc733bbc1aa1bc8e87630d38e65a │ │ ├─42579 /bin/bash /tmp/horizon.sh start │ │ └─43338 python /tmp/manage.py compilemessages │ ├─edd52900e70a6ad7d555a9148886f843c2b3651fe3ddfaad22a048d30d1c334f │ │ └─10371 /pause │ ├─a6fde201d6ce690ffe7680748852fe10ddd37c85962b5ab8d60d611a70fcf365 │ │ └─14962 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─1f5b46ae97d90c1dea42682649a91b389740b3bbb22fff86df4fd6bc5d91bfcf │ │ └─6919 /pause │ ├─bd0c4a939913bdfa670a69a20a4cb875de661c33012a0b751bd4dba5878b97c6 │ │ └─5069 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─bfa05a3777dce689c4918ad1cde09de45bea47b09f8fa3a9147f724233ead855 │ │ ├─42408 /bin/bash /tmp/horizon.sh start │ │ └─43234 python /tmp/manage.py compilemessages │ ├─729d308fcc3f90145aecd8c06bf83cc4178a308378398723e5649ebb90aee9ae │ │ └─4753 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─d5969d747bc6eae7db81a5156432ab02b14037234806cbcd81846dbd7f52c36d │ │ └─21442 /pause │ ├─a74077f22458a3f0b1b94b60554169e3824297b7f92273cdcb231bcc7e8d611e │ │ └─23733 /bin/oauth2-proxy │ ├─d7036d1e1502aa1ca523c3d7b0ca105ffb013ffb6880f72008d8812d2cfff1a3 │ │ └─23691 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─d488bca5815d5557608cffb9928f0a0c7ad976456371cfccd6161c57440803ce │ │ └─8163 /pause │ ├─88fa82c570aab08eccd8ead20eefe150325044777592bd1d9ee8d4f6743c92bc │ │ └─21295 /pause │ ├─304670624f93272e9e654f7aa5b56d10489c71e8954eb99b7c8e6224f3af3b32 │ │ └─23452 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─ed7add15151bef5cb9c0a1f70c61f99326be96b39299189ca4005e7a778133a1 │ │ └─4628 /pause │ ├─3545b596f074e2c1a343bd94540a554e6ae6e150698a7d711f99613ba9d3de14 │ │ └─4593 /pause │ ├─eb299fc7e32e03bfa3223f6ce207a9d6fc440d0d8d70e24f173ab14dee056a20 │ │ └─23587 /pause │ ├─73f5ecbf40a3d692f17e9aada915439b20f0f89af2857b03c2560f4c91b5c3d4 │ │ └─11401 /manager --metrics-bind-address=:9782 │ ├─5ca2b9b7bf1aafaeb7822571498063e73b49a5f6fa7f2c1f7d7f58aa013af9bc │ │ └─7264 /pause │ ├─c388df0ac694e68ad009a8a261dbc1d1f1690b0d7d93b3a5f8074322c4479d58 │ │ ├─22209 python -u /app/sidecar.py │ │ ├─22428 python -u /app/sidecar.py │ │ └─22429 python -u /app/sidecar.py │ ├─dda2162607e73791ff0bc4ad283c1d6b7265fab01adff7ab0af5c68cb5be21cb │ │ └─12406 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─309c9232f27f7016666f812b19bc5844797bdcfd22c936a176509f54d5788604 │ │ └─7371 /coredns -conf /etc/coredns/Corefile │ └─647e92a38794cf4056d137f25b620ee953a4c7cbf0edf02e3bbf392cae1a9d91 │ ├─12331 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ └─13792 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount