Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─617 /lib/systemd/systemd --user │ │ └─618 (sd-pam) │ ├─session-4.scope │ │ ├─1357 sshd: zuul [priv] │ │ └─1370 sshd: zuul@notty │ └─session-1.scope │ ├─ 614 sshd: zuul [priv] │ ├─ 631 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1361 ssh: /home/zuul/.ansible/cp/199.204.45.140-22-zuul [mux] │ ├─38339 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-mphokdcoaqfimfkufthkemzftpqsxwjp ; /usr/bin/python3'"'"' && sleep 0' │ ├─38340 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-mphokdcoaqfimfkufthkemzftpqsxwjp ; /usr/bin/python3' && sleep 0 │ ├─38341 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-mphokdcoaqfimfkufthkemzftpqsxwjp ; /usr/bin/python3 │ ├─38342 /bin/sh -c echo BECOME-SUCCESS-mphokdcoaqfimfkufthkemzftpqsxwjp ; /usr/bin/python3 │ ├─38343 /usr/bin/python3 │ ├─38345 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38347 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2879 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4441 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 38e9c27047c4aa364225726af5c4178496b0157fc2017cb15e766ff862b99bba -address /run/containerd/containerd.sock │ │ ├─ 4452 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 685f5cb8b1a877848c212790b621b83f68aff0a485b0f819a75d2d9b32d5944d -address /run/containerd/containerd.sock │ │ ├─ 4487 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 105bb3f0980f8d119a8da60f00c589505e37a73ab337e5dbfaf200260e942578 -address /run/containerd/containerd.sock │ │ ├─ 4513 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 89f3b7178b14b8cf8d2ae0adaba07b9275fe1eaa11bcb7c1b4c48883d12fff4b -address /run/containerd/containerd.sock │ │ ├─ 4537 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 584cde7e0a10c51c3d27be22212d42af885d799612e398d34a0c6a23b7c63fa4 -address /run/containerd/containerd.sock │ │ ├─ 5014 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3e72f4fd5a5a5af2dbdc82eaf616c9020d7c04ba4cbf3fb146773a4d3f2760bc -address /run/containerd/containerd.sock │ │ ├─ 5721 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d9c2f99c6eebca694dc324a3e7543c952f7fa966f9c82e39e8a2356dc94c0e36 -address /run/containerd/containerd.sock │ │ ├─ 5790 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7f9f9561c27374c46e313866f6e1edda9b7578b3da984fb710521274e868e06c -address /run/containerd/containerd.sock │ │ ├─ 7227 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1db816f41216a997e83ec25303885e49117f61e6a56413d084ed79fe8fe1763a -address /run/containerd/containerd.sock │ │ ├─ 7579 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 46e8aee9c6ff90173e07ae0897a8f76e42b20e182a3164231811045228651375 -address /run/containerd/containerd.sock │ │ ├─ 7618 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 612a13c487b8a7174bb5e57ec1578d8c0a80686499142e59ee3fa28b59908dc9 -address /run/containerd/containerd.sock │ │ ├─ 7967 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f125bc92afbfd4e146b2e332f000b3b18d369bb4f7b9fe02a69b216c81101fce -address /run/containerd/containerd.sock │ │ ├─ 8423 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fd065cd44ee0913206e12c6bc091fde0c4b7352d50ae6abc04f6545b85c775a7 -address /run/containerd/containerd.sock │ │ ├─ 8462 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 799d634f1c14083c9a516b9ad7f8f768a29338122926a03c290fa9ac26cc29ec -address /run/containerd/containerd.sock │ │ ├─ 8486 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b1a303e46b14959f12ce5e84c2d4c58344c2740c2c3cb593c7630e6366ec9577 -address /run/containerd/containerd.sock │ │ ├─10664 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b75554374cbd0aa3f2e8906642b467e5b417692b64696c78f6fddc4443594772 -address /run/containerd/containerd.sock │ │ ├─10738 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8835ba358e3e6efaff260e4fa5f8951a008eacb4b104b669569296b8b4bfced6 -address /run/containerd/containerd.sock │ │ ├─11357 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a41f0cfaef8fdb020ae2f3c1fc83e9fe4d8a4051be2f7a683436d7ab8b38e597 -address /run/containerd/containerd.sock │ │ ├─11450 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 75db3a517b94c5600f307896b538e6256b043e91099fbd5b4e3d8f8f949bc58a -address /run/containerd/containerd.sock │ │ ├─11760 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a97e490ba7665164448563dbb5106c174d1fa9cc274eeb54586cb73173fdb247 -address /run/containerd/containerd.sock │ │ ├─12173 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bfaca01af36924b19651286dd769e15c8698081fd233c80a8436fd17bdd0e75f -address /run/containerd/containerd.sock │ │ ├─12505 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 76c63c16d0654b5d68aa54c10604b73808cceed66f1b9361421df3db2a547478 -address /run/containerd/containerd.sock │ │ ├─14187 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 72c9592ffcd5a2dc1efe436b707a70b1df704cef608486d1bd05733191aa4191 -address /run/containerd/containerd.sock │ │ ├─14832 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id baf7185619eeab780da9404bff2c1b6396a647cbf205142d9adff5f2e2dc1e4c -address /run/containerd/containerd.sock │ │ ├─18173 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 98eedd475e049c7db14e6eef9f6d1650c1afcd92c1b780a52277cbe3587cc056 -address /run/containerd/containerd.sock │ │ ├─20589 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9b41c63b39f49820642965c937db9bd6d4f0e1fdbe663c4bf99c7a5098f5da5f -address /run/containerd/containerd.sock │ │ ├─20742 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7bbc17cdae245cbd557cb08da0eb9dfcb316be408d8b4eeb055bed430a1ac71d -address /run/containerd/containerd.sock │ │ ├─20780 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id db30cdc9f86271d78fd7e748a7099eadf6821aed6b7cd82cc9941d74f28af3f4 -address /run/containerd/containerd.sock │ │ ├─20811 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 09a292962cd86ff9c135f7e0de25c801e3245a75598cc654fe6cb7f396f3a7b7 -address /run/containerd/containerd.sock │ │ ├─21811 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f830556ada531cc14fb0224c01dad9753c5d0a3dc92328d92f6ea0da91020392 -address /run/containerd/containerd.sock │ │ ├─21937 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 54d8eaf4dd149b2e0b37ef6f982453320d49fc86d836b4a220cc7fa2e2bb8f33 -address /run/containerd/containerd.sock │ │ ├─23261 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a5db9287a9f1bbaf1f8c579720fdea0b476a957513c257d0e1de3694e21f6c82 -address /run/containerd/containerd.sock │ │ ├─24318 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 99125341a080e522c884b198ccf0c9d173430badb979a54cdae4d741efbdb900 -address /run/containerd/containerd.sock │ │ ├─29852 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 211161cb6493dfcdddbf5feea5b05c43c6e372ff1db3d1ebab2b5a6cec422eb3 -address /run/containerd/containerd.sock │ │ ├─29892 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5e0d2835e925083357fd26322f67f2a0d6c5737f4a40d9c47f1cffac4a8a596f -address /run/containerd/containerd.sock │ │ └─30014 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5f42094875b00614e6a0d20ba8775391d7bc9e96e77c1a2f7486ec94a3c8b263 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1094 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─436 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─540 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─557 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─530 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4881 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.140 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─562 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1290 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─331 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─527 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─332 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─539 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─533 /lib/systemd/systemd-logind ├─k8s.io │ ├─89f3b7178b14b8cf8d2ae0adaba07b9275fe1eaa11bcb7c1b4c48883d12fff4b │ │ └─4608 /pause │ ├─584cde7e0a10c51c3d27be22212d42af885d799612e398d34a0c6a23b7c63fa4 │ │ └─4616 /pause │ ├─c48b8c18c1402add750724357be532a7d841b6c998f33fdbb8e17eba75fddd46 │ │ └─22260 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─38e9c27047c4aa364225726af5c4178496b0157fc2017cb15e766ff862b99bba │ │ └─4506 /pause │ ├─46e8aee9c6ff90173e07ae0897a8f76e42b20e182a3164231811045228651375 │ │ └─7608 /pause │ ├─930a6eea7df1d4de725898247fa5035878878dbfbc35c0c088f8af0f9998e6b3 │ │ └─22492 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-140.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─348ccab47a67bd7740cf11e0f1a92c6ed1d35eb952d945e3e05bcfc6cb507b46 │ │ └─4827 /kube-vip manager │ ├─05611b9bafb0624d8c3ac93c12413a97d2d5237991530cd0151f2734729cacd7 │ │ └─4724 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─1db816f41216a997e83ec25303885e49117f61e6a56413d084ed79fe8fe1763a │ │ └─7252 /pause │ ├─3e72f4fd5a5a5af2dbdc82eaf616c9020d7c04ba4cbf3fb146773a4d3f2760bc │ │ └─5037 /pause │ ├─95569a994f86b45cf8f8c37941210373aef5fbc810820b799f04b4c016055648 │ │ ├─12710 mysqld --wsrep_start_position=46f876bb-42a0-11f1-a03b-b71e2ed99755:20 │ │ └─12836 /var/lib/mysql/mysql-state-monitor │ ├─27bd85ffb6f0e452c14c1179949967249ab15ab4dceddce213fca0d984761aef │ │ └─22693 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-140.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─108d7e0af32312d3b973ef5f21b4c828c7de081c98163a238eb21993d8250d9b │ │ └─4688 etcd --advertise-client-urls=https://199.204.45.140:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.140:2380 --initial-cluster=instance=https://199.204.45.140:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.140:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.140:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─75db3a517b94c5600f307896b538e6256b043e91099fbd5b4e3d8f8f949bc58a │ │ └─11476 /pause │ ├─cc361a25d1cff54879f0545f98e2d23732c6757fcbf8a2ea89e6041fe871d76f │ │ └─14632 /bin/memcached_exporter │ ├─76c63c16d0654b5d68aa54c10604b73808cceed66f1b9361421df3db2a547478 │ │ └─12534 /pause │ ├─db30cdc9f86271d78fd7e748a7099eadf6821aed6b7cd82cc9941d74f28af3f4 │ │ └─20806 /pause │ ├─7f53ba8af29012d59cc7beaf0f7369fe54be2b46a7694ceb127a75893dd57d13 │ │ └─22961 /bin/oauth2-proxy │ ├─88b7629cbe5f0ff09b0d6a48bb0cb7b9edc2b2478f6a299b3ea6e5b5af24ac04 │ │ └─8710 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─78667688494be1e60ac65212823d7f413e96b86e7b01ffee9e17f468e2b14de8 │ │ ├─31315 apache2 -DFOREGROUND │ │ ├─33343 (wsgi:h -DFOREGROUND │ │ ├─33344 (wsgi:h -DFOREGROUND │ │ ├─33345 (wsgi:h -DFOREGROUND │ │ ├─33346 (wsgi:h -DFOREGROUND │ │ ├─33347 (wsgi:h -DFOREGROUND │ │ ├─33348 apache2 -DFOREGROUND │ │ └─33349 apache2 -DFOREGROUND │ ├─99125341a080e522c884b198ccf0c9d173430badb979a54cdae4d741efbdb900 │ │ └─24342 /pause │ ├─612a13c487b8a7174bb5e57ec1578d8c0a80686499142e59ee3fa28b59908dc9 │ │ └─7643 /pause │ ├─522c06cb9cae763b8e4c1319524e942f083df83ff0e1281ce9fc7d0ee9633fba │ │ └─8107 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─2f39489813498bed22a99ccee2997b86ba8e2cc8e50cf6e9bd0aea3ffd0d6cb9 │ │ ├─31296 apache2 -DFOREGROUND │ │ ├─33369 (wsgi:h -DFOREGROUND │ │ ├─33370 (wsgi:h -DFOREGROUND │ │ ├─33371 (wsgi:h -DFOREGROUND │ │ ├─33372 (wsgi:h -DFOREGROUND │ │ ├─33373 (wsgi:h -DFOREGROUND │ │ ├─33374 apache2 -DFOREGROUND │ │ └─33375 apache2 -DFOREGROUND │ ├─f125bc92afbfd4e146b2e332f000b3b18d369bb4f7b9fe02a69b216c81101fce │ │ └─7994 /pause │ ├─19c62efb59ebd999ba6c181c86600d1d6aaaa9c4da8de82144b29f83a8c00900 │ │ └─8631 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─d69e259e5090efbf4130215ce39a28ed3a9856d602b0c73286d608e64d6fb040 │ │ └─23006 /bin/oauth2-proxy │ ├─bfaca01af36924b19651286dd769e15c8698081fd233c80a8436fd17bdd0e75f │ │ └─12196 /pause │ ├─af34236d35f7de6100752389c77184f041d24d4cfadfca84553ddbafe50bb953 │ │ └─12904 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─62d98c5eb1f8cf9009a42203cd5382495fb17db778c4ec5d2943870110348b21 │ │ ├─21640 python -u /app/sidecar.py │ │ ├─21852 python -u /app/sidecar.py │ │ └─21853 python -u /app/sidecar.py │ ├─9d2288ea5ecb5c4b56539c4e1dcb46797c426808eda9e5c09cbf2eb7103f3278 │ │ ├─21615 python -u /app/sidecar.py │ │ ├─21850 python -u /app/sidecar.py │ │ └─21851 python -u /app/sidecar.py │ ├─5e0d2835e925083357fd26322f67f2a0d6c5737f4a40d9c47f1cffac4a8a596f │ │ └─29915 /pause │ ├─a62b227349719e2cfbc80976adc89a38756707f08166d6e531236e54aa3fa78d │ │ └─22765 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─966e80271b8ac48b7f4fbe27ea0fa56de00e1cd4ac5d67c6fdc54f92f6a84ad3 │ │ └─22527 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─72c9592ffcd5a2dc1efe436b707a70b1df704cef608486d1bd05733191aa4191 │ │ └─14210 /pause │ ├─d539357e2cd3988c305144cbe1c137a82500e76dd7a0323333b2b07d905363c2 │ │ └─7693 /coredns -conf /etc/coredns/Corefile │ ├─baf7185619eeab780da9404bff2c1b6396a647cbf205142d9adff5f2e2dc1e4c │ │ └─14857 /pause │ ├─b3dd92a35e7e926184beff2e790fe5951f1ca7ae3ad17a900e6a722c2663761b │ │ └─7284 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─7bbc17cdae245cbd557cb08da0eb9dfcb316be408d8b4eeb055bed430a1ac71d │ │ └─20765 /pause │ ├─b1a303e46b14959f12ce5e84c2d4c58344c2740c2c3cb593c7630e6366ec9577 │ │ └─8524 /pause │ ├─685f5cb8b1a877848c212790b621b83f68aff0a485b0f819a75d2d9b32d5944d │ │ └─4567 /pause │ ├─a5db9287a9f1bbaf1f8c579720fdea0b476a957513c257d0e1de3694e21f6c82 │ │ └─23285 /pause │ ├─211d813af79930a5d4fe4d1d40554c686ba7162e7e57aa6605daef730940f1a6 │ │ └─8669 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─c155e95591cee1c76cb4ace68602bd42a8d44be5365350a8af3ae4be3f36c6bb │ │ └─21871 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─54d8eaf4dd149b2e0b37ef6f982453320d49fc86d836b4a220cc7fa2e2bb8f33 │ │ └─21960 /pause │ ├─9dd58a06a9a0216afe795f9e3c49f90ac04d4e92b13c5f15c453a5974d2e20e6 │ │ └─21083 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─adc7b4ee8b9991478fe018598aac8ba02cf77612cb599a24a1847972c04728e1 │ │ └─12807 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─b1507838e2260e6f15fb8a9a5b665f4b0bdae24927082b7f5a04ac7ab0e5a665 │ │ ├─23459 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23475 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─23481 erl_child_setup 1048576 │ │ ├─23523 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23524 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23535 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─23598 /bin/sh -s rabbit_disk_monitor │ ├─85a5f183b3b62f5199a2788980465c9b1ee7f7121ae57f6eb80ffe699b15ba87 │ │ ├─10963 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10977 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─11102 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─31039 nginx: worker process │ │ ├─31072 nginx: worker process │ │ └─31073 nginx: cache manager process │ ├─2743a04af883962feb552397e6f290eb937312a66466a16540cb2fa6d74db589 │ │ ├─26600 apache2 -DFOREGROUND │ │ ├─26639 (wsgi:k -DFOREGROUND │ │ ├─26640 (wsgi:k -DFOREGROUND │ │ ├─26641 (wsgi:k -DFOREGROUND │ │ ├─26642 (wsgi:k -DFOREGROUND │ │ ├─26645 apache2 -DFOREGROUND │ │ ├─26646 apache2 -DFOREGROUND │ │ ├─26647 apache2 -DFOREGROUND │ │ ├─26648 apache2 -DFOREGROUND │ │ ├─26650 apache2 -DFOREGROUND │ │ ├─26652 apache2 -DFOREGROUND │ │ ├─26653 apache2 -DFOREGROUND │ │ ├─26655 apache2 -DFOREGROUND │ │ ├─26657 apache2 -DFOREGROUND │ │ └─26658 apache2 -DFOREGROUND │ ├─2a4b47f5a82f563ecbe9730e2b694c696135714f79a038634b6798f5e1446657 │ │ └─4738 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─799d634f1c14083c9a516b9ad7f8f768a29338122926a03c290fa9ac26cc29ec │ │ └─8503 /pause │ ├─b31ec74d52e610183fcb0f8c02e6ffee782f31e8480c432b114210cccca5e42b │ │ └─5839 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─869d40c7046b612d3075fffe1b1c92ff831ee787f9a057d06efc600e909f0bf4 │ │ └─4708 kube-apiserver --advertise-address=199.204.45.140 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─7f9f9561c27374c46e313866f6e1edda9b7578b3da984fb710521274e868e06c │ │ └─5813 /pause │ ├─f830556ada531cc14fb0224c01dad9753c5d0a3dc92328d92f6ea0da91020392 │ │ └─21836 /pause │ ├─fd065cd44ee0913206e12c6bc091fde0c4b7352d50ae6abc04f6545b85c775a7 │ │ └─8448 /pause │ ├─7b576beaa69ca78bf94fe8397c361b574d27beaee1a8b62c3b28ec6033700820 │ │ └─12064 percona-xtradb-cluster-operator │ ├─10bae4fed526cf10d9884e896186ed3746ab26e113c13482514894cab7a7607d │ │ └─11522 /manager --metrics-bind-address=:9782 │ ├─f3b2d660b3ed2e274c0fb795543d61a1d153a493e3b56e3f1099bc24b017a8d2 │ │ └─23211 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─09a292962cd86ff9c135f7e0de25c801e3245a75598cc654fe6cb7f396f3a7b7 │ │ └─20847 /pause │ ├─8835ba358e3e6efaff260e4fa5f8951a008eacb4b104b669569296b8b4bfced6 │ │ └─10762 /pause │ ├─078d5d0bb4162b36a2a4180c01aeee8c45b2b0dcaa86e1d5e80d0adbbdc403e6 │ │ └─18245 /secretgen-controller │ ├─5f42094875b00614e6a0d20ba8775391d7bc9e96e77c1a2f7486ec94a3c8b263 │ │ └─30082 /pause │ ├─211161cb6493dfcdddbf5feea5b05c43c6e372ff1db3d1ebab2b5a6cec422eb3 │ │ └─29881 /pause │ ├─9b41c63b39f49820642965c937db9bd6d4f0e1fdbe663c4bf99c7a5098f5da5f │ │ └─20626 /pause │ ├─0e8d539b3d0f99449ea984853ace41148b2ab4200fd83aa5b15bf58f0c21c319 │ │ ├─12665 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─15201 haproxy -sf 169 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─a41f0cfaef8fdb020ae2f3c1fc83e9fe4d8a4051be2f7a683436d7ab8b38e597 │ │ └─11381 /pause │ ├─8d3bc92d5dcade08e60f5a58a7e7e0abca09f23a144ac68b39393b5cec0687c7 │ │ └─14937 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─d9c2f99c6eebca694dc324a3e7543c952f7fa966f9c82e39e8a2356dc94c0e36 │ │ └─5750 /pause │ ├─42f2ec8b3ef80607ad52ccf7f59c05f558570411d6fecbe962ac116d64e2c9ba │ │ └─21346 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─0783e2110b7121c49dbcd85c331b6b0ba239ddd419fb573155e831f378698d5c │ │ └─5062 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─1f0ba44509b91564e12b3f59b8950dd514c64f82a7cc3b3cf642b7c6964a41e1 │ │ ├─31283 apache2 -DFOREGROUND │ │ ├─33455 (wsgi:h -DFOREGROUND │ │ ├─33456 (wsgi:h -DFOREGROUND │ │ ├─33457 (wsgi:h -DFOREGROUND │ │ ├─33458 (wsgi:h -DFOREGROUND │ │ ├─33459 (wsgi:h -DFOREGROUND │ │ ├─33460 apache2 -DFOREGROUND │ │ └─33461 apache2 -DFOREGROUND │ ├─a97e490ba7665164448563dbb5106c174d1fa9cc274eeb54586cb73173fdb247 │ │ └─11785 /pause │ ├─105bb3f0980f8d119a8da60f00c589505e37a73ab337e5dbfaf200260e942578 │ │ └─4575 /pause │ ├─1d18b5161fb7f7cba498ffd5ac788af1ff479fe2063b1620e159ae884f507ff1 │ │ └─22733 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─b6bb3ecaab8d9e3ad3cf737489b2d5717b5c220f590ee5ebe774fd5e58b4f6eb │ │ └─14582 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─5340a82c33904d3b1dfd1c959b0de3cc602187c071aeba690d817446d45c917e │ │ └─11001 /server │ ├─ed337951086e8add4d07b88ac88d1e5584da5ae882231796848083b95fa37463 │ │ └─7680 /coredns -conf /etc/coredns/Corefile │ ├─b75554374cbd0aa3f2e8906642b467e5b417692b64696c78f6fddc4443594772 │ │ └─10693 /pause │ ├─1242c9a7d6d03e635cebde875b4bf53bc76c57fa4ca996e90a6ae56013dffb1c │ │ ├─6520 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6834 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─d4e3c2558472e9be0de0879e27cfcab29f8d81540ad49761c9b55c23b5d83062 │ │ └─11620 /manager --metrics-bind-address=:8080 │ └─98eedd475e049c7db14e6eef9f6d1650c1afcd92c1b780a52277cbe3587cc056 │ └─18197 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount