Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-4.scope │ │ ├─1360 sshd: zuul [priv] │ │ └─1373 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 633 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1364 ssh: /home/zuul/.ansible/cp/199.204.45.240-22-zuul [mux] │ ├─37729 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-wbxicdmumgpcwhowjykzshoepnljxjxn ; /usr/bin/python3'"'"' && sleep 0' │ ├─37730 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-wbxicdmumgpcwhowjykzshoepnljxjxn ; /usr/bin/python3' && sleep 0 │ ├─37731 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-wbxicdmumgpcwhowjykzshoepnljxjxn ; /usr/bin/python3 │ ├─37732 /bin/sh -c echo BECOME-SUCCESS-wbxicdmumgpcwhowjykzshoepnljxjxn ; /usr/bin/python3 │ ├─37733 /usr/bin/python3 │ ├─37734 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37736 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2881 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4446 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 04a8fb5fb3f0013022840d534f391734c099bfd90a7f7b8d7006f580bb2d4b76 -address /run/containerd/containerd.sock │ │ ├─ 4453 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bf7aef8fb4e2313b7f897df8a75c667435daea40c877d701e9da160271de1fa5 -address /run/containerd/containerd.sock │ │ ├─ 4497 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4d7a2a380fc835b1cdb45aafb70e59f9bd63746f2986d5240a1453ff7028fbcd -address /run/containerd/containerd.sock │ │ ├─ 4503 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 52897ea1db12b237e281737be0526098828b1232712358705ed264f99bc616a6 -address /run/containerd/containerd.sock │ │ ├─ 4530 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 872485abb9aa0ace1118cc3e0aa366bea2efccd960fe411062897ca60bee1f57 -address /run/containerd/containerd.sock │ │ ├─ 4963 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b865a59b4d15c3decb67a5dde901cd2ff05df312b4aac7d374a54fdfc203de24 -address /run/containerd/containerd.sock │ │ ├─ 5664 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c93e801bcc3c5c623ab42cd4ed03bd6fb33eed291bd7ce3350edf8fe767133c0 -address /run/containerd/containerd.sock │ │ ├─ 5692 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1fc91523582b78472cf5ce14f84aed0d30e70821011634d3777c540d13eb1db7 -address /run/containerd/containerd.sock │ │ ├─ 6858 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a0618a6fa18aa3062f29e6a9ee4ff78a3a8a7a3e2c7f07e329b6022f401ae763 -address /run/containerd/containerd.sock │ │ ├─ 7209 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f1847a6ee17a45e6887435191404ad099bda436749b657e10d20ac8bf25e7d0f -address /run/containerd/containerd.sock │ │ ├─ 7248 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b1332e249304adb1273969d7d410e8ef7e2a3368df0104feaaf1a0d0df815543 -address /run/containerd/containerd.sock │ │ ├─ 7607 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 144ba23d25519c5fe6b2be2f6372df1ec8f5bf71816435c4f39cd31c5c050b2c -address /run/containerd/containerd.sock │ │ ├─ 8055 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b4215a95c7dad133cbba0c1a7a82c23b28272446953b41373d6a2496a4362e90 -address /run/containerd/containerd.sock │ │ ├─ 8102 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 707342ec083e42f40003823dcc9eb314b0df726f9f6418c20500c312af79d09b -address /run/containerd/containerd.sock │ │ ├─ 8139 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c44161cc8e2ff6321ba899b94d9d2932daee8fb33b5b68363495fb28ff41aeb7 -address /run/containerd/containerd.sock │ │ ├─10013 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a55e1bb7305b66e24993f04deb160b10bb291d63fcaceec4b0400add4f653322 -address /run/containerd/containerd.sock │ │ ├─10070 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6eee209d2b8d76dc8dd2241fbb9f969fad29876965798a5fd04fcbec37ccdd39 -address /run/containerd/containerd.sock │ │ ├─10719 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7066ec4cb41264ea4a301c53ee37d5ae3bcf9e1a22a69fb35981afc7e987cc8c -address /run/containerd/containerd.sock │ │ ├─10792 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fd6eaa529354183ab485a6de124a85261965c816fc043a91883ed71a3262e13c -address /run/containerd/containerd.sock │ │ ├─11084 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a8acf5004b22e2cdd7256df76c1b44c445f638e4737b94c4b700330febc87e29 -address /run/containerd/containerd.sock │ │ ├─11545 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e19bf4704c5d215ad1ccb06c9c6d1db24790180a96fa1024ff69313eef466986 -address /run/containerd/containerd.sock │ │ ├─11846 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 199d34d6ffe51ac2c833c66dc20f401d40a3e948378c6007cba6dd1e8d793fcb -address /run/containerd/containerd.sock │ │ ├─13557 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 92a7d875b1f94dc0404fe6695107b9aa568f51adc40ef415bdb05f5e2442a001 -address /run/containerd/containerd.sock │ │ ├─14182 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d949e7effa5fb52550ac88492909be4f0a29b17881732dcb6578a37f43c67d0c -address /run/containerd/containerd.sock │ │ ├─17761 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ddb51ed59029d63b6e34aedc27cb7a1b586e89f730d0db74806d2c3a071ddf52 -address /run/containerd/containerd.sock │ │ ├─20365 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 64edb2e21f90273bfcb6b258075b5c0aacfe561cd0ed912923f869a22e75c713 -address /run/containerd/containerd.sock │ │ ├─20396 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 37da34d23b26dcb12702c7308060fd4542d16b68783e00aa89243224aa87a579 -address /run/containerd/containerd.sock │ │ ├─20479 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 860e108d2572d6fd4fda6ffdbdfa05070e731d0a0cd550a042598ac357d61b58 -address /run/containerd/containerd.sock │ │ ├─20503 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 51240028be73b9e740ee19be2f1f362667ecb0c1df29d3daf57c14db2490f98e -address /run/containerd/containerd.sock │ │ ├─21623 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eac380f8b891963ac9236e2332a766e88247cdbfcb84a306afca2c0da2212489 -address /run/containerd/containerd.sock │ │ ├─21687 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b7605bc3c0057c3dd55f596682b6b9123ca7c610fcdf492e3198a5d6b3b55ecc -address /run/containerd/containerd.sock │ │ ├─22434 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ac5654fc38ab7ffde3ef7a7a36cb5777e9c8ff3bace128c745dda023e9c29fd4 -address /run/containerd/containerd.sock │ │ ├─23852 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6a70a484170d619ebea4876f9270f3626da9bcba0c5fd6ae6920af52b4875a6a -address /run/containerd/containerd.sock │ │ ├─29204 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5143f4dbffa9fcd46060b211379b8b1ee18989622a451d4d3ef5cca2eb48d6d9 -address /run/containerd/containerd.sock │ │ ├─29255 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b3b521c053b4d0d1223451cc12e7627bdc01b3b36dce9a4ce9ef19d1ccf39d3b -address /run/containerd/containerd.sock │ │ └─29302 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 13780aef88ae1e6345e7cb8d49e3a75d3333cb06b8f271a16aa056b0d5040a18 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1091 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─328 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─555 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─532 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4871 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.240 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─560 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1293 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─543 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─645b4d761d82407c0743bff88284ae2ac4460c46b24936b000a0efbd1bc5bfc9 │ │ ├─30581 apache2 -DFOREGROUND │ │ ├─33083 (wsgi:h -DFOREGROUND │ │ ├─33084 (wsgi:h -DFOREGROUND │ │ ├─33085 (wsgi:h -DFOREGROUND │ │ ├─33086 (wsgi:h -DFOREGROUND │ │ ├─33087 (wsgi:h -DFOREGROUND │ │ ├─33088 apache2 -DFOREGROUND │ │ └─33089 apache2 -DFOREGROUND │ ├─37da34d23b26dcb12702c7308060fd4542d16b68783e00aa89243224aa87a579 │ │ └─20440 /pause │ ├─95a5a8670ae7130d2265a13580c8064d729a6b719a0d9b28329539e721f2f2a5 │ │ └─6906 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─4d7a2a380fc835b1cdb45aafb70e59f9bd63746f2986d5240a1453ff7028fbcd │ │ └─4610 /pause │ ├─13780aef88ae1e6345e7cb8d49e3a75d3333cb06b8f271a16aa056b0d5040a18 │ │ └─29344 /pause │ ├─0e75c0c2b99ccb88ede59b38cb67213f372f90bff0e001cb4b9b2c25c9b80d7e │ │ └─10365 /server │ ├─a0618a6fa18aa3062f29e6a9ee4ff78a3a8a7a3e2c7f07e329b6022f401ae763 │ │ └─6882 /pause │ ├─d7afe30f6b658648430e52a5742c2aa922decabebdbe64846731cb13f1c92e45 │ │ └─12140 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─678c1c18d02c1c99b5c571fda87b8ef3ef9c6699b699d4a30f8b315cb9a13c7d │ │ └─20753 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.34.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─872485abb9aa0ace1118cc3e0aa366bea2efccd960fe411062897ca60bee1f57 │ │ └─4608 /pause │ ├─ddb51ed59029d63b6e34aedc27cb7a1b586e89f730d0db74806d2c3a071ddf52 │ │ └─17783 /pause │ ├─707342ec083e42f40003823dcc9eb314b0df726f9f6418c20500c312af79d09b │ │ └─8130 /pause │ ├─74a32ad761680508247e0f1f79bfccb96bed37fdd4bd616979c26e91a34233eb │ │ └─13924 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─bf5bcd6ab991ae6340d6801794eeb5cbc01b98bab581d6bbdc63c41fca2bf0a3 │ │ ├─26034 apache2 -DFOREGROUND │ │ ├─26055 (wsgi:k -DFOREGROUND │ │ ├─26056 (wsgi:k -DFOREGROUND │ │ ├─26057 (wsgi:k -DFOREGROUND │ │ ├─26058 (wsgi:k -DFOREGROUND │ │ ├─26064 apache2 -DFOREGROUND │ │ ├─26065 apache2 -DFOREGROUND │ │ ├─26066 apache2 -DFOREGROUND │ │ ├─26067 apache2 -DFOREGROUND │ │ ├─26068 apache2 -DFOREGROUND │ │ ├─26069 apache2 -DFOREGROUND │ │ ├─26070 apache2 -DFOREGROUND │ │ ├─26071 apache2 -DFOREGROUND │ │ ├─26073 apache2 -DFOREGROUND │ │ └─26074 apache2 -DFOREGROUND │ ├─85cee0665788334d00dca0e7eeaee99f319adbd549c1f0b32f058a1527092abc │ │ └─4729 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─2edb7f517d69649dca27ae81a20dc53b0c6663a9c812fa7d79c440500b61fac5 │ │ └─20972 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─b1332e249304adb1273969d7d410e8ef7e2a3368df0104feaaf1a0d0df815543 │ │ └─7279 /pause │ ├─a75a73829fd39f3569c018af570f7d52c441a679ed9be258835272aa50e562ff │ │ └─12188 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─b865a59b4d15c3decb67a5dde901cd2ff05df312b4aac7d374a54fdfc203de24 │ │ └─4988 /pause │ ├─620834daedf83d95d394e184ef92de39eb4da5db2cd5f9a8a2ccbe30d449597d │ │ ├─12043 mysqld --wsrep_start_position=5b482f0e-42ce-11f1-95ff-56738e44a999:20 │ │ └─12168 /var/lib/mysql/mysql-state-monitor │ ├─d949e7effa5fb52550ac88492909be4f0a29b17881732dcb6578a37f43c67d0c │ │ └─14206 /pause │ ├─04a8fb5fb3f0013022840d534f391734c099bfd90a7f7b8d7006f580bb2d4b76 │ │ └─4538 /pause │ ├─7cf98cdc841d92fff6da166eebfc6b49770951301b356a2f95d231a46aa6d9e4 │ │ └─17858 /secretgen-controller │ ├─eafc0b3ae2f49ba4ea223a3c5b35a90d9ebf0d516e0e730f75fe9c5c904de2a5 │ │ └─8316 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─94a1a1fd51bd179d03157a5a3ff3fdbf30498c615ae73ffdf3dd339a77757f60 │ │ ├─30614 apache2 -DFOREGROUND │ │ ├─33161 (wsgi:h -DFOREGROUND │ │ ├─33162 (wsgi:h -DFOREGROUND │ │ ├─33163 (wsgi:h -DFOREGROUND │ │ ├─33164 (wsgi:h -DFOREGROUND │ │ ├─33165 (wsgi:h -DFOREGROUND │ │ ├─33166 apache2 -DFOREGROUND │ │ └─33167 apache2 -DFOREGROUND │ ├─ac5654fc38ab7ffde3ef7a7a36cb5777e9c8ff3bace128c745dda023e9c29fd4 │ │ └─22466 /pause │ ├─8de5a04f094e31063505ae712281112266811480e03bb5d4c7584fee9e975fc6 │ │ └─22552 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─e6da851caa8c1380f7d8631c149851e5225dcce6c8ba9642eee5dae1f2607d09 │ │ ├─30598 apache2 -DFOREGROUND │ │ ├─33246 (wsgi:h -DFOREGROUND │ │ ├─33247 (wsgi:h -DFOREGROUND │ │ ├─33248 (wsgi:h -DFOREGROUND │ │ ├─33249 (wsgi:h -DFOREGROUND │ │ ├─33250 (wsgi:h -DFOREGROUND │ │ ├─33251 apache2 -DFOREGROUND │ │ └─33252 apache2 -DFOREGROUND │ ├─497e74ba18fae4e82f1f776f4bf310471d04c4a639f6f0d9fd4dd7df7a16242f │ │ └─7338 /coredns -conf /etc/coredns/Corefile │ ├─199d34d6ffe51ac2c833c66dc20f401d40a3e948378c6007cba6dd1e8d793fcb │ │ └─11870 /pause │ ├─c44161cc8e2ff6321ba899b94d9d2932daee8fb33b5b68363495fb28ff41aeb7 │ │ └─8163 /pause │ ├─6cf891ff51e2b3c3fbdd7057f577c6c1e1a12d75200914ed0c8a55b268e1b907 │ │ ├─22755 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─22773 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-13.2.2.6/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─22793 erl_child_setup 1048576 │ │ ├─22984 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/epmd -daemon │ │ ├─23019 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/inet_gethost 4 │ │ ├─23020 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/inet_gethost 4 │ │ └─23062 /bin/sh -s rabbit_disk_monitor │ ├─4dcf0ac51900605ba3fdc0e02310c95320ebc8adf8d43c3557f46ce9b3e9cab0 │ │ ├─6133 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6469 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─b3b521c053b4d0d1223451cc12e7627bdc01b3b36dce9a4ce9ef19d1ccf39d3b │ │ └─29289 /pause │ ├─975d4cc5a27d1beeef118efd17a3bf951c443e3b33b61ad0bf954822cab309b8 │ │ └─5012 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─b4215a95c7dad133cbba0c1a7a82c23b28272446953b41373d6a2496a4362e90 │ │ └─8081 /pause │ ├─4a6e0191ffa1ec236c8a669c8a88a8f5f6fc89b383837706b35b824200bef5ac │ │ └─10865 /manager --metrics-bind-address=:9782 │ ├─b7605bc3c0057c3dd55f596682b6b9123ca7c610fcdf492e3198a5d6b3b55ecc │ │ └─21709 /pause │ ├─7066ec4cb41264ea4a301c53ee37d5ae3bcf9e1a22a69fb35981afc7e987cc8c │ │ └─10743 /pause │ ├─262b73cb5cb88d0ee6ae3e9238b050566deaeb6f6cb3b73a8b44a9c4d0e9f6f3 │ │ └─7304 /coredns -conf /etc/coredns/Corefile │ ├─64edb2e21f90273bfcb6b258075b5c0aacfe561cd0ed912923f869a22e75c713 │ │ └─20417 /pause │ ├─e60f6884ecf85dc38035d7ab5eb424a6c3724e30556bc490c04f5d4acfebae87 │ │ ├─10294 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10307 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10437 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30362 nginx: worker process │ │ ├─30363 nginx: worker process │ │ └─30364 nginx: cache manager process │ ├─97dfa5f43f3771d2f9c4701816bca9671cc0b69cd3d067efc0a49acf8c19d422 │ │ └─8276 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─65efdaec2749d52d681bc65e90c7b85fb7eafd229cd5a9da2bd4a69d9625ae3b │ │ └─13998 /bin/memcached_exporter │ ├─b7a9001c164bdd9b8643184a78b413b09a89eb0ad0f29aeb04b4887f3ba1d22c │ │ └─22514 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-240.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─52897ea1db12b237e281737be0526098828b1232712358705ed264f99bc616a6 │ │ └─4585 /pause │ ├─3de1d9a7ebe3a3a1cee6fde86f418a8819686a5fc403c0205abb08a528dd0806 │ │ ├─21213 python -u /app/sidecar.py │ │ ├─21433 python -u /app/sidecar.py │ │ └─21434 python -u /app/sidecar.py │ ├─2d403eb70a0bdf79618f1c3d7ff64e272b0356323895b831808fa3b069f34ad6 │ │ ├─21277 python -u /app/sidecar.py │ │ ├─21438 python -u /app/sidecar.py │ │ └─21439 python -u /app/sidecar.py │ ├─ff2f6506b131fb5cc41aab58319477dd9b7cefdb25ea2d27a3e34ce9c1c8768a │ │ └─4824 /kube-vip manager │ ├─eac380f8b891963ac9236e2332a766e88247cdbfcb84a306afca2c0da2212489 │ │ └─21653 /pause │ ├─a8acf5004b22e2cdd7256df76c1b44c445f638e4737b94c4b700330febc87e29 │ │ └─11107 /pause │ ├─6a70a484170d619ebea4876f9270f3626da9bcba0c5fd6ae6920af52b4875a6a │ │ └─23876 /pause │ ├─da201f08539a8008989dcf905980589baed5c92723234e9d2e5814be5965a287 │ │ └─22791 /bin/oauth2-proxy │ ├─58e06c099f5060a69c1e13fbf34d9aec7613743791bab8c70500bf07459efb4e │ │ └─22719 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─8b682169bf0c2c0d104c4b86bf487e9736ac0a61d26d2d97978bb9c8d67bb2c9 │ │ └─22839 /bin/oauth2-proxy │ ├─c8198e2c818e590e162677b1a22f7c95d6bab6cb21d977a782c4c03ac89f9846 │ │ └─21895 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─ae13eb95a8359f8e2335213d2140e226adc7d8e20b6f6409a634c78bb9f13314 │ │ └─4703 kube-apiserver --advertise-address=199.204.45.240 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─4b8a26eb4341c1b0cbeff1696fbd139d136ec6a5cf5e47d5857493b9d3976069 │ │ └─10959 /manager --metrics-bind-address=:8080 │ ├─fd6eaa529354183ab485a6de124a85261965c816fc043a91883ed71a3262e13c │ │ └─10814 /pause │ ├─a998e01f24931aa59dcd089eac9f41b9385b521d4d2dac717a4002efb69fe4ec │ │ └─11389 percona-xtradb-cluster-operator │ ├─77bb66688a4f2f8b7b032167171a3c703adf7327fe78045e8940148639ddba5c │ │ └─5931 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─144ba23d25519c5fe6b2be2f6372df1ec8f5bf71816435c4f39cd31c5c050b2c │ │ └─7631 /pause │ ├─c93e801bcc3c5c623ab42cd4ed03bd6fb33eed291bd7ce3350edf8fe767133c0 │ │ └─5703 /pause │ ├─a426cdade97cff5fe95c26c187ea49ba808a4917452a7152bb36884df31a8aca │ │ ├─11999 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13180 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─10b2cb17fbf08792777f3281960a2c37d60b52081b6c9515dc67115985be57cc │ │ └─8356 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─f1847a6ee17a45e6887435191404ad099bda436749b657e10d20ac8bf25e7d0f │ │ └─7233 /pause │ ├─1fc91523582b78472cf5ce14f84aed0d30e70821011634d3777c540d13eb1db7 │ │ └─5728 /pause │ ├─860e108d2572d6fd4fda6ffdbdfa05070e731d0a0cd550a042598ac357d61b58 │ │ └─20521 /pause │ ├─8f24cb26e8ec4405412209c92db525649b31461e0bbf977108671e665b7932d7 │ │ └─4739 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─a9f959bd6ae8a85082340971ec57efd7af801600494f07e9d208db522ed1305b │ │ └─7680 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─1d8c19678937ec8e2707fbad11c570e28dcac3b6ae70a8d2eef006600bb59d8e │ │ └─22384 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─6abae5c9a9214e29d7b43c07b551b004cf7386c45e4e6f479a088d65c10fbd04 │ │ └─22436 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─51240028be73b9e740ee19be2f1f362667ecb0c1df29d3daf57c14db2490f98e │ │ └─20541 /pause │ ├─e19bf4704c5d215ad1ccb06c9c6d1db24790180a96fa1024ff69313eef466986 │ │ └─11569 /pause │ ├─0d9c8e4776bf15b228162c03c64e6bb2be71af72d358ca907c698dddf6529f42 │ │ └─14312 java -Dkc.config.built=true -Xms64m -Xmx512m -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─d9c72a23d2ae8d9bc9696a23dfd2db46b2cd5f981ff2630e32a4c8ae15749794 │ │ └─22325 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-240.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─c3010fe9279a689191fefbee7c51436d598150fdca71e33db86631bb703e884d │ │ └─4680 etcd --advertise-client-urls=https://199.204.45.240:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.240:2380 --initial-cluster=instance=https://199.204.45.240:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.240:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.240:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─bf7aef8fb4e2313b7f897df8a75c667435daea40c877d701e9da160271de1fa5 │ │ └─4560 /pause │ ├─79bf0af3ff9465445eb256ce4d01a2235b71e16d602f584037c63f1a1f7fafe5 │ │ └─21408 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─6eee209d2b8d76dc8dd2241fbb9f969fad29876965798a5fd04fcbec37ccdd39 │ │ └─10093 /pause │ ├─92a7d875b1f94dc0404fe6695107b9aa568f51adc40ef415bdb05f5e2442a001 │ │ └─13582 /pause │ ├─5143f4dbffa9fcd46060b211379b8b1ee18989622a451d4d3ef5cca2eb48d6d9 │ │ └─29232 /pause │ └─a55e1bb7305b66e24993f04deb160b10bb291d63fcaceec4b0400add4f653322 │ └─10041 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount