Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─618 /lib/systemd/systemd --user │ │ └─619 (sd-pam) │ └─session-1.scope │ ├─ 615 sshd: zuul [priv] │ ├─ 632 sshd: zuul@notty │ ├─ 771 /usr/bin/python3 │ ├─39736 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-joqwonangyuvksxtxqqxivdjdkpfcshd ; /usr/bin/python3'"'"' && sleep 0' │ ├─39737 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-joqwonangyuvksxtxqqxivdjdkpfcshd ; /usr/bin/python3' && sleep 0 │ ├─39738 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-joqwonangyuvksxtxqqxivdjdkpfcshd ; /usr/bin/python3 │ ├─39739 /bin/sh -c echo BECOME-SUCCESS-joqwonangyuvksxtxqqxivdjdkpfcshd ; /usr/bin/python3 │ ├─39740 /usr/bin/python3 │ ├─39741 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─39743 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2877 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4440 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2ff0dca533fc3c2fcfee9ec9da37fcd39a80309cec16b58ce8ac3cf519127b3c -address /run/containerd/containerd.sock │ │ ├─ 4455 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 778c1ffa945380b3c5993352d4f882dede3dda1f2dca469943bc120b1f5c0480 -address /run/containerd/containerd.sock │ │ ├─ 4474 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 697d0c11d99e6efb8c51718d52bdd48372e3ee5c992e143462d9d5d323ae30ac -address /run/containerd/containerd.sock │ │ ├─ 4499 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2867d70258ecab18228f46913b9b33d379f224557f2161b2e889129eeb7bdcaf -address /run/containerd/containerd.sock │ │ ├─ 4501 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 59f83833696232037b6bc45f6af33d127bdb83e216eeebf4bf1a257660016481 -address /run/containerd/containerd.sock │ │ ├─ 5018 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5e38c50ffe7ae0aac9a3c0a41b3a112a5725cf43cac9b5d91d1f87e86524cd97 -address /run/containerd/containerd.sock │ │ ├─ 5658 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3ed27da26096807915849c48715f43e76ad66a75354f1c0b71f361a6f2b91560 -address /run/containerd/containerd.sock │ │ ├─ 5683 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bdd1cfae1c38f0bc26c4109782bca89bfd37d70e8fadce9c96420798b1ff8a22 -address /run/containerd/containerd.sock │ │ ├─ 7046 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6db35addcd701cb1a8ff01174daf00095cc83c5887097aacaa5adba7a6ce2026 -address /run/containerd/containerd.sock │ │ ├─ 7389 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e1a81b3ac382e32b04ac39bd02ab779477c65a754fd87b55034fe2af6fbe0e56 -address /run/containerd/containerd.sock │ │ ├─ 7463 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a118806c165ae6a0f63e266f3758f3883ff97cc460b1dfb22b0b1dc8df474a10 -address /run/containerd/containerd.sock │ │ ├─ 7780 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 407cff91fcdc441e92009d9460bc59acad62d865f611804710c89c0a1ecb9d87 -address /run/containerd/containerd.sock │ │ ├─ 8259 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 51da068f7dfe6604033e8697b6144e58b0fd6a05fad131db47e8ab799bd944ff -address /run/containerd/containerd.sock │ │ ├─ 8313 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ba2ff24cf988e86ab2e9553787bedae4674384c6f116cf8f653e300bb3306cb7 -address /run/containerd/containerd.sock │ │ ├─ 8368 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 050c414d27e392437903abb6a373141fadd237ef249f0485fefd849e734be55a -address /run/containerd/containerd.sock │ │ ├─10661 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2f2fb1375af8dd8a6a0d5592da296f1cb40ca6b8aca7cc8cc83bf8f96f6b7e87 -address /run/containerd/containerd.sock │ │ ├─10738 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d5fc66231f0c7e39f87c789f531846dfc70b429fb765eeb2527f52c1670cc47d -address /run/containerd/containerd.sock │ │ ├─11225 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0e1251d474b549ceb833d142049e8cb9a72e776294859181edf05991e5b707e9 -address /run/containerd/containerd.sock │ │ ├─11328 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b6ed3773617cf7de548494fc5a486c1b5d086f694a0619accd4eaef544215985 -address /run/containerd/containerd.sock │ │ ├─11635 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2e5772a9277e4c752c4eb08094ee582874451401b0e49047b2d391ecea9004ae -address /run/containerd/containerd.sock │ │ ├─12029 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 10da5c741d306f6af495662cb8380fb14b011e163135afd391697d55655f9cf5 -address /run/containerd/containerd.sock │ │ ├─12401 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c47c192506b1353ef47d65601a36230f9d9b701ae480feb2c444b9bf47a08761 -address /run/containerd/containerd.sock │ │ ├─14074 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f8e88fea4279b8a7c7d4baa2c161135561a4c319db01e2852e752429addf37ea -address /run/containerd/containerd.sock │ │ ├─14733 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4dc38602334e23c3131286e159ecc10b73d9065912bb4814c8c3f8632c9e4fe3 -address /run/containerd/containerd.sock │ │ ├─18277 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 69ebfc8eafcbcb50b67b16ada4a0dce26b9e2bad3128007261c2c02d578f2fb7 -address /run/containerd/containerd.sock │ │ ├─20960 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dcba397c82302c3a3ccb9d59adf1989ec773e94609fac88b460959b628470177 -address /run/containerd/containerd.sock │ │ ├─21058 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 16d8d2276ab94390c4aeecaefb04e4b1c201421d34cb906adba30d6890eba4fe -address /run/containerd/containerd.sock │ │ ├─21103 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1c40477185551dac9e1cc939e02af44d63ab280680e1b680b0ecc0aa0ba61761 -address /run/containerd/containerd.sock │ │ ├─21141 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aa516efbffbb3000669b5ccdb7326fd5ad0988c8549fac4fa2ddb945886962b3 -address /run/containerd/containerd.sock │ │ ├─22264 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ebc0840741206b1e7d3af20b970e78f5afd002c6aa78d25df7290018487bbe89 -address /run/containerd/containerd.sock │ │ ├─22341 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b19508c18f0cad22d2f406504aaa0e574a4293837245c2ca7de56c7531564aa0 -address /run/containerd/containerd.sock │ │ ├─23210 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8cb62cb06054612cb56c142a0e6802115cd0c51db48082927a8fa0ca098d51c4 -address /run/containerd/containerd.sock │ │ ├─24706 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 94821f0d549aabd94a2ab38ca2f3d418342c57e9c860d2dbf01f775b13710808 -address /run/containerd/containerd.sock │ │ ├─30181 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d7e2aa60c27e640b945dba5ffcd4c7dee29e3856e7a428a5e4505e0d807e36fe -address /run/containerd/containerd.sock │ │ ├─30227 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c888ed7966f77115228ae49926626720ea069461bf39253ce0e4828179605b75 -address /run/containerd/containerd.sock │ │ └─30283 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ce77db95dbaf26fab9b5fabcbd87fe3fbf4152569b8482af5f176f5ee3098ece -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1095 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─438 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─330 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─543 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─560 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─533 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4871 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.119 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─565 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1289 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─530 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─541 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─536 /lib/systemd/systemd-logind ├─k8s.io │ ├─912bb78961bde425618fcaaf1ac46de2a0a27d7bf3b3ab1fd8e1ed7c5535d923 │ │ └─23148 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─7ee126689088df4b0fa8dae0b4628737fedde9092b8b0a0eb6bed71b982677d5 │ │ └─8481 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─4d09d141b4651413406f24212aff2b56d2c0ce34ef5818645909567589225293 │ │ └─4733 kube-apiserver --advertise-address=199.19.213.119 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─4dc38602334e23c3131286e159ecc10b73d9065912bb4814c8c3f8632c9e4fe3 │ │ └─14758 /pause │ ├─8cb62cb06054612cb56c142a0e6802115cd0c51db48082927a8fa0ca098d51c4 │ │ └─23237 /pause │ ├─55ad8695d82277e3160ee786ede44957e21898c37d4ee61f581a28ead6b7f17a │ │ └─18436 /secretgen-controller │ ├─bc7d5553b92f2dd6a261914a5e5e8df361354bc311f504b33585f636b1638aed │ │ └─4719 etcd --advertise-client-urls=https://199.19.213.119:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.119:2380 --initial-cluster=instance=https://199.19.213.119:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.119:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.119:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─51da068f7dfe6604033e8697b6144e58b0fd6a05fad131db47e8ab799bd944ff │ │ └─8284 /pause │ ├─3623532297a31c81dec785939badd9cd7a4b423fc57fe5907826ced5135eaf81 │ │ └─12669 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─3d3c0244f8db16a4646cb25a8226d4dadce976ff2b7a36f8fcd6c65722fbb751 │ │ └─6118 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─ba2ff24cf988e86ab2e9553787bedae4674384c6f116cf8f653e300bb3306cb7 │ │ └─8358 /pause │ ├─3a109b86f408e0970a294d184f270f936300ad61ffabd8dc7d92e26215fdfbba │ │ └─23260 /bin/oauth2-proxy │ ├─0f65725e33ae1b78a642d386d5ecdd3f118fc13f2852047eb48640e719257564 │ │ └─11496 /manager --metrics-bind-address=:8080 │ ├─a118806c165ae6a0f63e266f3758f3883ff97cc460b1dfb22b0b1dc8df474a10 │ │ └─7495 /pause │ ├─c888ed7966f77115228ae49926626720ea069461bf39253ce0e4828179605b75 │ │ └─30253 /pause │ ├─c47c192506b1353ef47d65601a36230f9d9b701ae480feb2c444b9bf47a08761 │ │ └─12426 /pause │ ├─778c1ffa945380b3c5993352d4f882dede3dda1f2dca469943bc120b1f5c0480 │ │ └─4577 /pause │ ├─09b8c641366415766706ec6a26bb2c111c44cfdc43f5717e7c2e20c5f932fc70 │ │ └─21657 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─7a2dc4116ebfb757fafb76c9085d74af3828311b09839ed2a3cbc03bc71a0453 │ │ └─12766 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─d2bcbb6d61e525553e58c2f06be5e86ae67f60243830f67c4f5374001847661e │ │ └─22941 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─d9b401efaac6feff7c69b8aee0291d69ab391d10c3bd7a945822f323efb69b6d │ │ └─7853 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─8dde131d7e47cf8523d9f4639f31faddaf516f62213ba34f530a4ae8c26516ad │ │ └─14517 /bin/memcached_exporter │ ├─60d01ebc97470218697dce089bc9961771372a8f3eb5033aaccd92cbaf44d3ee │ │ └─22516 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─e1a81b3ac382e32b04ac39bd02ab779477c65a754fd87b55034fe2af6fbe0e56 │ │ └─7415 /pause │ ├─353cfcf0af49037289922e900a6d4ccfabb603395a7b970163cccc18cdd23854 │ │ ├─31970 apache2 -DFOREGROUND │ │ ├─33862 (wsgi:h -DFOREGROUND │ │ ├─33863 (wsgi:h -DFOREGROUND │ │ ├─33864 (wsgi:h -DFOREGROUND │ │ ├─33865 (wsgi:h -DFOREGROUND │ │ ├─33866 (wsgi:h -DFOREGROUND │ │ ├─33867 apache2 -DFOREGROUND │ │ └─33868 apache2 -DFOREGROUND │ ├─16d8d2276ab94390c4aeecaefb04e4b1c201421d34cb906adba30d6890eba4fe │ │ └─21082 /pause │ ├─7c108ff3816c18eed870c00aa88d04a72d7b2ef95a9f59a3e986fcb0bda9fcda │ │ ├─21541 python -u /app/sidecar.py │ │ ├─21740 python -u /app/sidecar.py │ │ └─21741 python -u /app/sidecar.py │ ├─ebc0840741206b1e7d3af20b970e78f5afd002c6aa78d25df7290018487bbe89 │ │ └─22287 /pause │ ├─d7e2aa60c27e640b945dba5ffcd4c7dee29e3856e7a428a5e4505e0d807e36fe │ │ └─30207 /pause │ ├─0a0a1b65d616eb93ddf851cfde934a66ea369eda04004f7bc4ea2953a95cad73 │ │ └─23281 /bin/oauth2-proxy │ ├─67798a4cf0c0a7c368f54803209b610cc51358937a4131eaea060e0007417b52 │ │ ├─21573 python -u /app/sidecar.py │ │ ├─21864 python -u /app/sidecar.py │ │ └─21865 python -u /app/sidecar.py │ ├─4871c436dcab44c561394075c2997db266e5d21b92f12005655be7708f6dc27b │ │ └─11784 percona-xtradb-cluster-operator │ ├─0e4e168a48ce86d60c6cb10fc97ee5638470cee0d6a40666a02d536be75a1b2f │ │ └─21272 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─697d0c11d99e6efb8c51718d52bdd48372e3ee5c992e143462d9d5d323ae30ac │ │ └─4560 /pause │ ├─1ec51aa2d60ae40786efa688122d6db9351268290c62c2c922889c6f34e81e5a │ │ └─4695 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─60b9e7e91df6cbe89007a900fdf81a8b6097abda836348fe230d19e5caabc15d │ │ ├─10948 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10961 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─11015 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─31407 nginx: worker process │ │ ├─31408 nginx: worker process │ │ └─31409 nginx: cache manager process │ ├─34c4cc23bbcaa27a11c91afb509c796ec53967399ff9d6c4488300c18d19caf2 │ │ └─7448 /coredns -conf /etc/coredns/Corefile │ ├─407cff91fcdc441e92009d9460bc59acad62d865f611804710c89c0a1ecb9d87 │ │ └─7804 /pause │ ├─dcba397c82302c3a3ccb9d59adf1989ec773e94609fac88b460959b628470177 │ │ └─21008 /pause │ ├─3ed27da26096807915849c48715f43e76ad66a75354f1c0b71f361a6f2b91560 │ │ └─5695 /pause │ ├─bdd1cfae1c38f0bc26c4109782bca89bfd37d70e8fadce9c96420798b1ff8a22 │ │ └─5722 /pause │ ├─d5fc66231f0c7e39f87c789f531846dfc70b429fb765eeb2527f52c1670cc47d │ │ └─10760 /pause │ ├─62f96269af333b341455a2212a9986e9ff2b495e12109e0294a65650fe072843 │ │ └─22908 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-119.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─0d154134f7f36499bcde586f0fc75788885ba9934092dc10b42aedd03de327a0 │ │ └─14472 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─f198954ffc825c712dacb377c2c67bd99bc7c7b9c0e5ebc808966972a618a959 │ │ ├─6320 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6685 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─10da5c741d306f6af495662cb8380fb14b011e163135afd391697d55655f9cf5 │ │ └─12056 /pause │ ├─657ba2cd3252ebdf952ab831e732719fbec382704f92a9327f7cac68f3994cfb │ │ └─23444 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─aa516efbffbb3000669b5ccdb7326fd5ad0988c8549fac4fa2ddb945886962b3 │ │ └─21164 /pause │ ├─684d5b6761b904e15e519f92d653d0a25450794b2ec46b11734af54cb2f71088 │ │ ├─12520 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13730 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─f76acc1db998dc042da94a34f51b6353f75e3f9be4506978f4dab42437925874 │ │ └─8521 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─4b49c59da6a2bdff53c9865a100d9fbc3cbe8d16415caa8c635deb86214f6a14 │ │ └─23110 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─2b290c5cd92660b24f38b1e771bd9aa63cf5b659ff20f35e28ac17f4f6f7ac5f │ │ ├─12572 mysqld --wsrep_start_position=3d8bbdae-3cc4-11f1-9d40-820bc1cc5872:20 │ │ └─12698 /var/lib/mysql/mysql-state-monitor │ ├─ef685e730e95c51b0d7f95e77f8672052ec449448d5129a2f3c67e064ce76dcf │ │ └─8561 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─2f2fb1375af8dd8a6a0d5592da296f1cb40ca6b8aca7cc8cc83bf8f96f6b7e87 │ │ └─10686 /pause │ ├─97ceb79bf815d2cc61d1017742cf67adc12de2c03add2c4d1cefa2247e2e572f │ │ └─11397 /manager --metrics-bind-address=:9782 │ ├─5e38c50ffe7ae0aac9a3c0a41b3a112a5725cf43cac9b5d91d1f87e86524cd97 │ │ └─5042 /pause │ ├─b51b1cb6c06b68711e347339147c712c9f64dc4bd74914b061ae07df7d477b37 │ │ └─7529 /coredns -conf /etc/coredns/Corefile │ ├─b6ed3773617cf7de548494fc5a486c1b5d086f694a0619accd4eaef544215985 │ │ └─11351 /pause │ ├─69ebfc8eafcbcb50b67b16ada4a0dce26b9e2bad3128007261c2c02d578f2fb7 │ │ └─18304 /pause │ ├─520a81aa1327549bbe405f79f055d655e4f28b4d6a5788ea82d68aede5768910 │ │ └─14836 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─cf95509b5b50a0e6da891fd415af7dc05d7d2332e1d9f047ccb148f8f58b6865 │ │ └─4676 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─ce77db95dbaf26fab9b5fabcbd87fe3fbf4152569b8482af5f176f5ee3098ece │ │ └─30312 /pause │ ├─d177c95afa631afd128ef6166abdb9831685d8b49a9abc2cdcb8cfc005f595cc │ │ ├─23578 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23595 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─23601 erl_child_setup 1048576 │ │ ├─23632 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23633 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23643 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─23724 /bin/sh -s rabbit_disk_monitor │ ├─d3ebba96b75001b80e977dfb2045676de7886f91d4cc8839674e6de3f13c60c4 │ │ └─10785 /server │ ├─08a61ec4528dc3ebebd8c021d512f4f6958a59fa902b9177cb7ad077c99ae1fd │ │ ├─31549 apache2 -DFOREGROUND │ │ ├─33702 (wsgi:h -DFOREGROUND │ │ ├─33703 (wsgi:h -DFOREGROUND │ │ ├─33704 (wsgi:h -DFOREGROUND │ │ ├─33705 (wsgi:h -DFOREGROUND │ │ ├─33706 (wsgi:h -DFOREGROUND │ │ ├─33707 apache2 -DFOREGROUND │ │ └─33708 apache2 -DFOREGROUND │ ├─f82cff2a9369f6dfe79e78b48ff1481b7b046147167f9b961d11816ff8c5388d │ │ └─7100 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─0e1251d474b549ceb833d142049e8cb9a72e776294859181edf05991e5b707e9 │ │ └─11248 /pause │ ├─f8e88fea4279b8a7c7d4baa2c161135561a4c319db01e2852e752429addf37ea │ │ └─14098 /pause │ ├─94821f0d549aabd94a2ab38ca2f3d418342c57e9c860d2dbf01f775b13710808 │ │ └─24729 /pause │ ├─cb5f9e283624b71ddecfe156acea78962ab9232b4ed461460fe461232e2bd8b5 │ │ └─23075 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-119.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─1c40477185551dac9e1cc939e02af44d63ab280680e1b680b0ecc0aa0ba61761 │ │ └─21131 /pause │ ├─b19508c18f0cad22d2f406504aaa0e574a4293837245c2ca7de56c7531564aa0 │ │ └─22365 /pause │ ├─c24cd2d120433d49bec6974b271244d751c1ec0c164e47d9379d6af3b3d619d1 │ │ ├─27036 apache2 -DFOREGROUND │ │ ├─27055 (wsgi:k -DFOREGROUND │ │ ├─27056 (wsgi:k -DFOREGROUND │ │ ├─27057 (wsgi:k -DFOREGROUND │ │ ├─27058 (wsgi:k -DFOREGROUND │ │ ├─27059 apache2 -DFOREGROUND │ │ ├─27061 apache2 -DFOREGROUND │ │ ├─27065 apache2 -DFOREGROUND │ │ ├─27066 apache2 -DFOREGROUND │ │ ├─27068 apache2 -DFOREGROUND │ │ ├─27069 apache2 -DFOREGROUND │ │ ├─27070 apache2 -DFOREGROUND │ │ ├─27072 apache2 -DFOREGROUND │ │ ├─27073 apache2 -DFOREGROUND │ │ └─27074 apache2 -DFOREGROUND │ ├─063541172a5dd2663c4c0ccaefd35dbbb81574d634ea4841d74f69b3f50b0738 │ │ └─5068 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─a5e9a96e9b74e81a9035f5f01f80d8ea5519d43f9154215b655158518a781e89 │ │ ├─31950 apache2 -DFOREGROUND │ │ ├─33948 (wsgi:h -DFOREGROUND │ │ ├─33949 (wsgi:h -DFOREGROUND │ │ ├─33950 (wsgi:h -DFOREGROUND │ │ ├─33952 (wsgi:h -DFOREGROUND │ │ ├─33953 (wsgi:h -DFOREGROUND │ │ ├─33954 apache2 -DFOREGROUND │ │ └─33955 apache2 -DFOREGROUND │ ├─6db35addcd701cb1a8ff01174daf00095cc83c5887097aacaa5adba7a6ce2026 │ │ └─7071 /pause │ ├─2867d70258ecab18228f46913b9b33d379f224557f2161b2e889129eeb7bdcaf │ │ └─4604 /pause │ ├─7d5b3965126d976856bc002c3c0c486ff92d9a503d2f26bcca49520c0760f902 │ │ └─4823 /kube-vip manager │ ├─2e5772a9277e4c752c4eb08094ee582874451401b0e49047b2d391ecea9004ae │ │ └─11660 /pause │ ├─050c414d27e392437903abb6a373141fadd237ef249f0485fefd849e734be55a │ │ └─8396 /pause │ ├─2ff0dca533fc3c2fcfee9ec9da37fcd39a80309cec16b58ce8ac3cf519127b3c │ │ └─4556 /pause │ ├─1b0ff23c1c44d3679cf38afad1af618f99a7638f17ef54c5aea55cf2b74f58ee │ │ └─21990 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ └─59f83833696232037b6bc45f6af33d127bdb83e216eeebf4bf1a257660016481 │ └─4614 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount