Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─617 /lib/systemd/systemd --user │ │ └─618 (sd-pam) │ ├─session-4.scope │ │ ├─1360 sshd: zuul [priv] │ │ └─1373 sshd: zuul@notty │ └─session-1.scope │ ├─ 614 sshd: zuul [priv] │ ├─ 631 sshd: zuul@notty │ ├─ 768 /usr/bin/python3 │ ├─ 1364 ssh: /home/zuul/.ansible/cp/199.204.45.25-22-zuul [mux] │ ├─39565 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-yjvuqdngcmsuhftmzeiyfgeujxhpfian ; /usr/bin/python3'"'"' && sleep 0' │ ├─39566 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-yjvuqdngcmsuhftmzeiyfgeujxhpfian ; /usr/bin/python3' && sleep 0 │ ├─39567 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-yjvuqdngcmsuhftmzeiyfgeujxhpfian ; /usr/bin/python3 │ ├─39570 /bin/sh -c echo BECOME-SUCCESS-yjvuqdngcmsuhftmzeiyfgeujxhpfian ; /usr/bin/python3 │ ├─39571 /usr/bin/python3 │ ├─39572 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─39574 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2882 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4454 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b24d6ca80767650d84799b1a17e621ad4de6c67e60d2a45c5d790d361c58ba6e -address /run/containerd/containerd.sock │ │ ├─ 4467 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c0a518b0290b6c2ecd064b830799f78a3892aa246f4f484910dfdf3a174fad1e -address /run/containerd/containerd.sock │ │ ├─ 4499 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0bad4216eeea7b29912bce7c0999d9bc5b44f94f6a034162238c0535a152d225 -address /run/containerd/containerd.sock │ │ ├─ 4506 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 40d10887e768452c674d3e110e8f0c8f7994b5cae6265402eed01b286470c71b -address /run/containerd/containerd.sock │ │ ├─ 4539 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 156a477719ac0ad2fb7ddf9fe12e88f3e5f4db0843b7ebce0508955621a4361d -address /run/containerd/containerd.sock │ │ ├─ 4982 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fa1f72326ac4e0913630919feef9aec3568ee5b63ba684f543ae82888a501fca -address /run/containerd/containerd.sock │ │ ├─ 5683 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dcbb62c371f368b9874fa38dc49bb697522c7b29dc017ac008c21c0d20106d18 -address /run/containerd/containerd.sock │ │ ├─ 5711 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 04b3eed9fa998ea184499d0fbe796603a665a4cf7eb553d7399c7575460eedee -address /run/containerd/containerd.sock │ │ ├─ 6881 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id af1c1ef6964178053cabbd2f69aca1467aeda9003c6f0baf5aa1921d77241b3b -address /run/containerd/containerd.sock │ │ ├─ 7218 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e9aba52f10500a1316caaa0695867e1b9d30fb7f2fcbca07662c9d89653e1a2e -address /run/containerd/containerd.sock │ │ ├─ 7251 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4931cb252fe1cc6bbeca09fd3b1fe8535526eddb08d57b164dd8a12f500b528f -address /run/containerd/containerd.sock │ │ ├─ 7609 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6ffef70079e7b294160eaa9f8a6c8f37cbe6715d0a87cfe6b0e9f186abdfdaef -address /run/containerd/containerd.sock │ │ ├─ 8054 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e7a6ae34a00634ae47b92fb2b2c700dc4bfbbf18c76521c5163536ab51770d9b -address /run/containerd/containerd.sock │ │ ├─ 8098 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8e1e6cd372c037a6fcda33dd51404c9c7462820f40f59e072663ff55b2d253a5 -address /run/containerd/containerd.sock │ │ ├─ 8137 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d4ccbddcf45aa513910525986daf32dfcd61b1205782a2d3a24b3484b01e63fc -address /run/containerd/containerd.sock │ │ ├─10329 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b313835265dadadf2785b205e3520753f66dd0021e65fa978dc8b03ecabcf4b7 -address /run/containerd/containerd.sock │ │ ├─10395 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 25c3b3e78af8b115e03a32d3109bf4b51e0bb6ccca13991619f63168540db44e -address /run/containerd/containerd.sock │ │ ├─11184 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d5948ed0a1e1966f96f17b112ed3759014b23f5a1a9e76f6bfe7c9639036405b -address /run/containerd/containerd.sock │ │ ├─11285 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 245b7fd8515440db7754b32577ffe093a6ad63945eeaa379e00573327dfd2b49 -address /run/containerd/containerd.sock │ │ ├─11588 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d22f200532431b43011401684a8d4d9de3f249b80c5766ceccb018ca7eae9bcd -address /run/containerd/containerd.sock │ │ ├─11902 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dfa2666119b16eb409a52cf66efea8c45df747dcc0f9ded0f8d17b2ac35a0595 -address /run/containerd/containerd.sock │ │ ├─12207 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d7378a6f4e1c3ce5e49046c8549da828ee4a41fc6813301a7edb14c84872db1c -address /run/containerd/containerd.sock │ │ ├─14345 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b45f13e88d3463d4c2e8c3fbf1a06deea9ed07a0acab8cf02fe6974b674f0dbf -address /run/containerd/containerd.sock │ │ ├─14973 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 12a114067c38d8aa5551c82970526b22d58af700c3f986fd047204f6a63297ba -address /run/containerd/containerd.sock │ │ ├─18859 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 41e140329ee79ea298e722a55ab842a1570a7ac64f4bbde359b45f4b2627688a -address /run/containerd/containerd.sock │ │ ├─21607 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8847570e96927b337732b2b4631361cdfeeea21b7425e631dce74307463bbd76 -address /run/containerd/containerd.sock │ │ ├─21711 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 43ca6ec127e20f3fe46758b2d3441b3bd42b773da050898da318b7a18f1b30b9 -address /run/containerd/containerd.sock │ │ ├─21747 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 71ff4f932848374f76566b981eec6ea2c28f22d6e700507bc151fb347365547c -address /run/containerd/containerd.sock │ │ ├─21800 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5a28d666ca3f6748419813c0144d95b05d241661e8e710c04e2fa0d8c4061a28 -address /run/containerd/containerd.sock │ │ ├─22998 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e68001e298f4966b2e751cf2edad1e9bb437dab0434f3ed18a78728bfe6714c1 -address /run/containerd/containerd.sock │ │ ├─23038 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 77dafbe06ca3459fbebc0ff41351bd417c255a26d937afc202d60e7759d01506 -address /run/containerd/containerd.sock │ │ ├─23734 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a1d0cc4dcbc5b8d20ed2b099435488ce93004bdc90dd90f380caa589a8b1f88d -address /run/containerd/containerd.sock │ │ ├─25422 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d1d165466ab14d01e10d56b7ba71d38322d62f576e050f941da4ff011c194edb -address /run/containerd/containerd.sock │ │ ├─30899 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2835be0b6d989a05affb65a9bae99db1aea920aeee1b42e27a51246d93218c5e -address /run/containerd/containerd.sock │ │ ├─30983 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a2b25682661a06f53cb4cd7ad1746ef078fd38ebbcdfe5c1bc4d87c82d09119b -address /run/containerd/containerd.sock │ │ └─31031 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 97301ff7389d55f2f5f787d4bb779861dd1342cdb3f019e690d481c3016583a3 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1093 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─430 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─320 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─536 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─554 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─526 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4888 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.25 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─289 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─558 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1295 /usr/sbin/uuidd --socket-activation │ ├─systemd-resolved.service │ │ └─323 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─522 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─324 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─532 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─528 /lib/systemd/systemd-logind ├─k8s.io │ ├─c9fc24583104974f661f77435397b5babd0ff0434029664d3db14868652482b7 │ │ └─7751 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─1293fdb206480c9c2bcc031f9095b18765fc91df1d6b1e597442a0ba3e695b47 │ │ ├─27722 apache2 -DFOREGROUND │ │ ├─27740 (wsgi:k -DFOREGROUND │ │ ├─27741 (wsgi:k -DFOREGROUND │ │ ├─27742 (wsgi:k -DFOREGROUND │ │ ├─27743 (wsgi:k -DFOREGROUND │ │ ├─27747 apache2 -DFOREGROUND │ │ ├─27748 apache2 -DFOREGROUND │ │ ├─27749 apache2 -DFOREGROUND │ │ ├─27750 apache2 -DFOREGROUND │ │ ├─27751 apache2 -DFOREGROUND │ │ ├─27752 apache2 -DFOREGROUND │ │ ├─27753 apache2 -DFOREGROUND │ │ ├─27754 apache2 -DFOREGROUND │ │ ├─27755 apache2 -DFOREGROUND │ │ └─27757 apache2 -DFOREGROUND │ ├─c5ede4dd42561f93a42dedf6a482cbdbe4b42108ec1cf543c838376a14bfdcf2 │ │ └─4751 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─6ffef70079e7b294160eaa9f8a6c8f37cbe6715d0a87cfe6b0e9f186abdfdaef │ │ └─7634 /pause │ ├─8ae0460a1b9aae8f20723bfcff2061a51e89b00b982d504ed76bd1c4f49bb37d │ │ └─23913 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-25.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─87ec84aab2dd148eebe8195d7c74440bd73aae63936de043536da875703f0026 │ │ └─4714 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─d1d165466ab14d01e10d56b7ba71d38322d62f576e050f941da4ff011c194edb │ │ └─25445 /pause │ ├─41e140329ee79ea298e722a55ab842a1570a7ac64f4bbde359b45f4b2627688a │ │ └─18882 /pause │ ├─b87133435aba5a46f78bb0b41bde024eceb277a0a7d8a8e7956d9b7d76013b7a │ │ └─22787 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─25c3b3e78af8b115e03a32d3109bf4b51e0bb6ccca13991619f63168540db44e │ │ └─10418 /pause │ ├─af1c1ef6964178053cabbd2f69aca1467aeda9003c6f0baf5aa1921d77241b3b │ │ └─6905 /pause │ ├─5407a562db7a9d928bf98ff10c6bee95070b1f17e9015b650e4140e95a475845 │ │ └─23821 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─14c791e6a6e98a93289f07a0326619d1fb9288e0369fbfb9e095e83a1b7954e1 │ │ └─7312 /coredns -conf /etc/coredns/Corefile │ ├─63c3e2de7de0af282b48f112bb5085ab110870b9f8858a45c93d9184d82fda9a │ │ ├─12420 mysqld --wsrep_start_position=4929fabb-35ce-11f1-99ea-8b8ad67f2c1a:20 │ │ └─12570 /var/lib/mysql/mysql-state-monitor │ ├─97301ff7389d55f2f5f787d4bb779861dd1342cdb3f019e690d481c3016583a3 │ │ └─31055 /pause │ ├─b2c9915d60a170bbcd8d5150a635468cfad577520d01951c09e3725b0869191b │ │ ├─24531 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─24547 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─24553 erl_child_setup 1048576 │ │ ├─24617 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─24618 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─24628 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─24702 /bin/sh -s rabbit_disk_monitor │ ├─4dbe9ac43ca2588fd26b741178ef796a553f8f7c05bcb8ad871608310aebf086 │ │ └─4695 kube-apiserver --advertise-address=199.204.45.25 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─f2bf20366162a7d2a9294ea9ec0b8516be0ce3800742fbb2fe952090b2613625 │ │ └─10662 /server │ ├─c8dc2abcf91c1556a80ffacf9ef9b1386a691cf3a871210f7a6a90a8da96bb48 │ │ └─6041 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─27ee345b3347badd91a7de7f95916ecae6a9fdcd6ccf3bf914b1e0910e556c31 │ │ └─24145 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─0289cab4e2e3a1e2beecf201ea5b170ce56816e44c5200f097a8865a0fde0cba │ │ └─7337 /coredns -conf /etc/coredns/Corefile │ ├─6ef4e9ae1e5de52c9c79e4ef87614b60092a85e34b1770a63a3630a089a211ee │ │ ├─22553 python -u /app/sidecar.py │ │ ├─22723 python -u /app/sidecar.py │ │ └─22724 python -u /app/sidecar.py │ ├─6201e5fe0d11490533da1ff4278a66f6106c1d1aa933b1b43e1ec072e58de6c5 │ │ └─23276 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─12a114067c38d8aa5551c82970526b22d58af700c3f986fd047204f6a63297ba │ │ └─14999 /pause │ ├─77dafbe06ca3459fbebc0ff41351bd417c255a26d937afc202d60e7759d01506 │ │ └─23062 /pause │ ├─917f016ef7f588d6ece5a9d0bc81007ea1541ed6bb59d4531570208720145b45 │ │ ├─32652 apache2 -DFOREGROUND │ │ ├─34658 (wsgi:h -DFOREGROUND │ │ ├─34659 (wsgi:h -DFOREGROUND │ │ ├─34660 (wsgi:h -DFOREGROUND │ │ ├─34661 (wsgi:h -DFOREGROUND │ │ ├─34662 (wsgi:h -DFOREGROUND │ │ ├─34663 apache2 -DFOREGROUND │ │ └─34664 apache2 -DFOREGROUND │ ├─4c16ad946491915888d3e6288a9eec04887ab4e0cd527405c3e0b7ecd281acfc │ │ ├─6155 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6522 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─c0a518b0290b6c2ecd064b830799f78a3892aa246f4f484910dfdf3a174fad1e │ │ └─4579 /pause │ ├─e68001e298f4966b2e751cf2edad1e9bb437dab0434f3ed18a78728bfe6714c1 │ │ └─23022 /pause │ ├─d5948ed0a1e1966f96f17b112ed3759014b23f5a1a9e76f6bfe7c9639036405b │ │ └─11208 /pause │ ├─b24d6ca80767650d84799b1a17e621ad4de6c67e60d2a45c5d790d361c58ba6e │ │ └─4558 /pause │ ├─52a728c725bb75e92b9a5d45f8346ee40c7076c5e5cfe01cbb40102fca39bf42 │ │ └─24437 /bin/oauth2-proxy │ ├─04b3eed9fa998ea184499d0fbe796603a665a4cf7eb553d7399c7575460eedee │ │ └─5748 /pause │ ├─156a477719ac0ad2fb7ddf9fe12e88f3e5f4db0843b7ebce0508955621a4361d │ │ └─4630 /pause │ ├─d13c33d0a5cd25935bc741448157a45ea60da10adec93a0420166e3891320587 │ │ ├─32688 apache2 -DFOREGROUND │ │ ├─34480 (wsgi:h -DFOREGROUND │ │ ├─34481 (wsgi:h -DFOREGROUND │ │ ├─34482 (wsgi:h -DFOREGROUND │ │ ├─34483 (wsgi:h -DFOREGROUND │ │ ├─34484 (wsgi:h -DFOREGROUND │ │ ├─34485 apache2 -DFOREGROUND │ │ └─34486 apache2 -DFOREGROUND │ ├─d7378a6f4e1c3ce5e49046c8549da828ee4a41fc6813301a7edb14c84872db1c │ │ └─12232 /pause │ ├─903c059328b95f14d46b545b1750d5ff7f194c87b515026069d36c5f6becd0f1 │ │ └─4741 etcd --advertise-client-urls=https://199.204.45.25:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.25:2380 --initial-cluster=instance=https://199.204.45.25:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.25:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.25:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─dbeecaa477eecd1ac9a6e0a82472bf684617d7ea1598ccd6fc3ee400af5d05a0 │ │ └─5031 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─d579a1dfb4f0c82b61dcd0d15a162e3895bd8a38ae4486952b63734b6610185f │ │ └─14858 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─40d10887e768452c674d3e110e8f0c8f7994b5cae6265402eed01b286470c71b │ │ └─4606 /pause │ ├─fa1f72326ac4e0913630919feef9aec3568ee5b63ba684f543ae82888a501fca │ │ └─5006 /pause │ ├─dcbb62c371f368b9874fa38dc49bb697522c7b29dc017ac008c21c0d20106d18 │ │ └─5727 /pause │ ├─b63c3d28c9d24770050536bef64c106734e27f89e33d1889a11d11cf9bb854d2 │ │ └─22055 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─961b5e28a4d6ff3abcd337a08f6bbe1eb7bb6d40cef742597488af61b65a1606 │ │ └─14958 /bin/memcached_exporter │ ├─b313835265dadadf2785b205e3520753f66dd0021e65fa978dc8b03ecabcf4b7 │ │ └─10352 /pause │ ├─a8697e005953dc233a52b2727762de18e670663bb9e7bb335b9f6e48d6a4a2c7 │ │ └─8314 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─ea1fe9dfcb8b46ea7f3bbb3bd60b87a03496848aa5220b3d5a919a11f9af1261 │ │ └─22227 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─4a700f5c9f716a20f09d05efb96337a27c8476e37ff0d3c2f667b7a4c9f607b4 │ │ └─23959 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─f65364ecdc9b0d4c6f1db6a7a91c13f977e5d7853016c1577013718f7a4d1a11 │ │ └─11730 percona-xtradb-cluster-operator │ ├─8847570e96927b337732b2b4631361cdfeeea21b7425e631dce74307463bbd76 │ │ └─21649 /pause │ ├─e7a6ae34a00634ae47b92fb2b2c700dc4bfbbf18c76521c5163536ab51770d9b │ │ └─8078 /pause │ ├─d22f200532431b43011401684a8d4d9de3f249b80c5766ceccb018ca7eae9bcd │ │ └─11612 /pause │ ├─a1d0cc4dcbc5b8d20ed2b099435488ce93004bdc90dd90f380caa589a8b1f88d │ │ └─23757 /pause │ ├─5346be98c7ec1c42b48f5c9fb904a4994d8232c6736896c8ebffc11872c9639f │ │ └─8275 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─c50e2b8382d4637df806edc81586f0e2cb144702cfe954387cb481de70f1582f │ │ └─11355 /manager --metrics-bind-address=:9782 │ ├─43d5fb610bb82d300e11267a87ecae2b1d882ff1beb648613b1462d3a8635856 │ │ └─12516 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─5a28d666ca3f6748419813c0144d95b05d241661e8e710c04e2fa0d8c4061a28 │ │ └─21823 /pause │ ├─fad97c3631a55b0fa08a602aa3ac44d5b13588efa03ef8fe8aa6af8853c7f5bc │ │ ├─22579 python -u /app/sidecar.py │ │ ├─22729 python -u /app/sidecar.py │ │ └─22730 python -u /app/sidecar.py │ ├─a2b25682661a06f53cb4cd7ad1746ef078fd38ebbcdfe5c1bc4d87c82d09119b │ │ └─31007 /pause │ ├─089b781f9f2aa2fe9bdc19426ba629132c5c08dccd7ce09732f9a598f4a75a04 │ │ ├─32697 apache2 -DFOREGROUND │ │ ├─34500 (wsgi:h -DFOREGROUND │ │ ├─34501 (wsgi:h -DFOREGROUND │ │ ├─34502 (wsgi:h -DFOREGROUND │ │ ├─34503 (wsgi:h -DFOREGROUND │ │ ├─34504 (wsgi:h -DFOREGROUND │ │ ├─34505 apache2 -DFOREGROUND │ │ └─34506 apache2 -DFOREGROUND │ ├─02f78bdb59b7160ce4676cd6ec77a11ec6497784d15cf513f514cf34f4e3d17e │ │ └─23787 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-25.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─ffc69e0b30eb5d5a6eb47af637a37cc05ac8ab57f6afaaabe8fb4f17acbee4b4 │ │ ├─12363 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13912 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─43ca6ec127e20f3fe46758b2d3441b3bd42b773da050898da318b7a18f1b30b9 │ │ └─21733 /pause │ ├─6c70ad24facd48714c1fda7dc1403afeaba9d2b86c543a2fda0e7ea1ba3463d8 │ │ ├─10625 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10637 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10739 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─32212 nginx: worker process │ │ ├─32213 nginx: worker process │ │ └─32214 nginx: cache manager process │ ├─8e1e6cd372c037a6fcda33dd51404c9c7462820f40f59e072663ff55b2d253a5 │ │ └─8126 /pause │ ├─dfa2666119b16eb409a52cf66efea8c45df747dcc0f9ded0f8d17b2ac35a0595 │ │ └─11926 /pause │ ├─e9aba52f10500a1316caaa0695867e1b9d30fb7f2fcbca07662c9d89653e1a2e │ │ └─7249 /pause │ ├─4931cb252fe1cc6bbeca09fd3b1fe8535526eddb08d57b164dd8a12f500b528f │ │ └─7281 /pause │ ├─245b7fd8515440db7754b32577ffe093a6ad63945eeaa379e00573327dfd2b49 │ │ └─11308 /pause │ ├─c139ad6870c921a492001b3ab0f2f6dd4d29f22bfc9379de42d1e2bb0e6e462d │ │ └─12684 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─f37d52471968820489ed4d025188fda27a7e5d3d628eb62e9b06d71e3b555039 │ │ └─24397 /bin/oauth2-proxy │ ├─b45f13e88d3463d4c2e8c3fbf1a06deea9ed07a0acab8cf02fe6974b674f0dbf │ │ └─14370 /pause │ ├─7c2797cb06a4cb7a231e921dea9cfb290e0a595555ec9328054bd2c9b5411536 │ │ └─23996 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─d4ccbddcf45aa513910525986daf32dfcd61b1205782a2d3a24b3484b01e63fc │ │ └─8161 /pause │ ├─b62395dadc46c76e3051bbbb293a4066158af8b024a117bf3be789f07c7c030c │ │ └─15129 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─71ff4f932848374f76566b981eec6ea2c28f22d6e700507bc151fb347365547c │ │ └─21770 /pause │ ├─2835be0b6d989a05affb65a9bae99db1aea920aeee1b42e27a51246d93218c5e │ │ └─30925 /pause │ ├─0bad4216eeea7b29912bce7c0999d9bc5b44f94f6a034162238c0535a152d225 │ │ └─4602 /pause │ ├─06fe2f8a4f7f5c369c309d295a05f7282f13d41ea32b438bf136ab65228d8b34 │ │ └─11455 /manager --metrics-bind-address=:8080 │ ├─da0d4d47e530743be6233c4d1e344df5f00dbe7b05fdca4070ba05853e9630bc │ │ └─6935 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─81bda2f01f768c5e4d4249bf5ee31e40e3e3796a207d5b30393b038771a763a4 │ │ └─18932 /secretgen-controller │ ├─96a6d023bb9b703330cb382154d3d7b11a21fe3dadd6b9729fa80c086addc589 │ │ └─4840 /kube-vip manager │ └─1054fe27b2dee046f511dfc51b224179386d464b723219f845795d701067f13b │ └─8354 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount