Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─622 /lib/systemd/systemd --user │ │ └─623 (sd-pam) │ ├─session-4.scope │ │ ├─1364 sshd: zuul [priv] │ │ └─1377 sshd: zuul@notty │ └─session-1.scope │ ├─ 619 sshd: zuul [priv] │ ├─ 637 sshd: zuul@notty │ ├─ 776 /usr/bin/python3 │ ├─ 1368 ssh: /home/zuul/.ansible/cp/199.204.45.70-22-zuul [mux] │ ├─17976 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-rrhxinohmhotciyzyimogwmggzvughgt ; /usr/bin/python3'"'"' && sleep 0' │ ├─17977 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-rrhxinohmhotciyzyimogwmggzvughgt ; /usr/bin/python3' && sleep 0 │ ├─17978 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-rrhxinohmhotciyzyimogwmggzvughgt ; /usr/bin/python3 │ ├─17979 /bin/sh -c echo BECOME-SUCCESS-rrhxinohmhotciyzyimogwmggzvughgt ; /usr/bin/python3 │ ├─17980 /usr/bin/python3 │ ├─18032 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─18034 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2887 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4446 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a386338781780d75a6934bb6328eabd724b82306f4816e7fda5e44d3eaacb111 -address /run/containerd/containerd.sock │ │ ├─ 4463 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 074d1530411288715da24dbdb8b26f7ddce1944008097ab446a8fc7a6839710f -address /run/containerd/containerd.sock │ │ ├─ 4512 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 277a93f5b14874101d17efdc98247cdd6b09b3ca09cb3348697e578f27863f42 -address /run/containerd/containerd.sock │ │ ├─ 4515 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6eb676645046c38a276cc5bc6d6c2b328bd19f3b3dbd239c29ffac4bf1d81a51 -address /run/containerd/containerd.sock │ │ ├─ 4530 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c0c770eb8d255fe34794bcbe70989f60c7c8256c0873c1c35029e25817791a33 -address /run/containerd/containerd.sock │ │ ├─ 4973 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a8279481ec232acff9be288ceca2d90391f165c9f12bec24523c7ba96ff0fe9e -address /run/containerd/containerd.sock │ │ ├─ 5667 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 32700585ce5cdd30ea3b0705d0f75a79de6d202a34a0bf3d9f5bba6820f1b894 -address /run/containerd/containerd.sock │ │ ├─ 5700 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 52d4763102c653ff2fbc4d9d8d7efc3ae1d5fa58247689ee64c1611c9270b78e -address /run/containerd/containerd.sock │ │ ├─ 6853 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 46300f7207d7f7a60ce68eadf753708888cf496a1d0bd5711b02b08cc0523581 -address /run/containerd/containerd.sock │ │ ├─ 7216 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 30c73ed310d8ac118edea538ed9ee3d6be8a06ff2676c53052c13c4a4aa96d0a -address /run/containerd/containerd.sock │ │ ├─ 7250 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2ae2327fc45a52c65826177ccfa44499dd8a9eb5ee21325403e95f9429a4db19 -address /run/containerd/containerd.sock │ │ ├─ 7604 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 33021e33cd5b61a21ea95e327af7a8298de76dc078b5c2282e446c2ff78ffc5b -address /run/containerd/containerd.sock │ │ ├─ 8064 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e05ad67d2766dee916a0c8a6a37413e3d4df906a2599d0363ab4722625a15794 -address /run/containerd/containerd.sock │ │ ├─ 8111 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f707316e6d69dca67e12d80e1e78c7a4eeac415a69c99f08c715ccf472ae2d5b -address /run/containerd/containerd.sock │ │ ├─ 8136 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c752ac4035abef41cc47827b5071569a7225e8f3389b944996d0b45357f195e1 -address /run/containerd/containerd.sock │ │ ├─10323 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 86d7b64b55a6fded0534f7aa100584d39c4b5724f4d758930166f1e32e5d8c7a -address /run/containerd/containerd.sock │ │ ├─10409 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ec7b75a318062c215bfa603f31de5d211a8d9022e845b394cd74877f0e86d480 -address /run/containerd/containerd.sock │ │ ├─11049 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 689ba2e6b004ae0964e29570e3885083f95ca763633236e4340e7919aa6100da -address /run/containerd/containerd.sock │ │ ├─11143 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b7e33f7c040978d1d2db5c4614e8c26fe56c4737391b7532cb4151c9d8dccce8 -address /run/containerd/containerd.sock │ │ ├─11436 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6a2b5418e6e175cb9e2c7b0ef98a1168b04c2bb427f72f4944bd4aaf3062bc22 -address /run/containerd/containerd.sock │ │ ├─11872 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 59190c25f859c28f0998e6d9db213392d9533032bd5fa9da3be12047c80ccd62 -address /run/containerd/containerd.sock │ │ ├─12263 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9ddcfe357583cad0259268744005e889081dc132b12ccb89c990b8c4bac359c4 -address /run/containerd/containerd.sock │ │ ├─13854 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c9c8ee8fbb8752ba2f567c7427c50e78f66e9fcd8b617f5a46c846648ef45c8e -address /run/containerd/containerd.sock │ │ ├─14482 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ead1aa6efd58ff01ebbb56e51e7ae44890f0bbdb8e2aeb15ea2c197403540351 -address /run/containerd/containerd.sock │ │ └─17836 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 83e46b742ea53128e99e2846f5c5aec489e9560d8eefe84de9fba002f22f4101 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1097 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─438 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ ├─ 327 /lib/systemd/systemd-udevd │ │ ├─17787 /lib/systemd/systemd-udevd │ │ ├─17790 /lib/systemd/systemd-udevd │ │ ├─17798 /lib/systemd/systemd-udevd │ │ ├─17799 /lib/systemd/systemd-udevd │ │ ├─17800 /lib/systemd/systemd-udevd │ │ ├─17801 /lib/systemd/systemd-udevd │ │ ├─17802 /lib/systemd/systemd-udevd │ │ ├─17803 /lib/systemd/systemd-udevd │ │ ├─17804 /lib/systemd/systemd-udevd │ │ ├─17805 /lib/systemd/systemd-udevd │ │ ├─17806 /lib/systemd/systemd-udevd │ │ ├─17807 /lib/systemd/systemd-udevd │ │ ├─17808 /lib/systemd/systemd-udevd │ │ ├─17809 /lib/systemd/systemd-udevd │ │ ├─17810 /lib/systemd/systemd-udevd │ │ ├─17811 /lib/systemd/systemd-udevd │ │ ├─17812 /lib/systemd/systemd-udevd │ │ ├─17813 /lib/systemd/systemd-udevd │ │ ├─17814 /lib/systemd/systemd-udevd │ │ ├─17815 /lib/systemd/systemd-udevd │ │ ├─17816 /lib/systemd/systemd-udevd │ │ ├─17817 /lib/systemd/systemd-udevd │ │ ├─17818 /lib/systemd/systemd-udevd │ │ ├─17819 /lib/systemd/systemd-udevd │ │ ├─17820 /lib/systemd/systemd-udevd │ │ ├─17821 /lib/systemd/systemd-udevd │ │ ├─17822 /lib/systemd/systemd-udevd │ │ ├─17823 /lib/systemd/systemd-udevd │ │ ├─17824 /lib/systemd/systemd-udevd │ │ └─17825 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─563 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─535 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4882 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.70 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─567 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1299 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─331 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─332 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─543 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─c91df7845662558d8b28a5b5927133c0ce12e7dc54e8ea7d7338376a800481c8 │ │ └─8360 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─52d4763102c653ff2fbc4d9d8d7efc3ae1d5fa58247689ee64c1611c9270b78e │ │ └─5734 /pause │ ├─ec7b75a318062c215bfa603f31de5d211a8d9022e845b394cd74877f0e86d480 │ │ └─10431 /pause │ ├─59190c25f859c28f0998e6d9db213392d9533032bd5fa9da3be12047c80ccd62 │ │ └─11896 /pause │ ├─e05ad67d2766dee916a0c8a6a37413e3d4df906a2599d0363ab4722625a15794 │ │ └─8090 /pause │ ├─b7e33f7c040978d1d2db5c4614e8c26fe56c4737391b7532cb4151c9d8dccce8 │ │ └─11169 /pause │ ├─d8cd7af47994c9c4a82867e98c6dbca6223f6518290d504fb6f7e556c58dcbf0 │ │ └─14587 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─46300f7207d7f7a60ce68eadf753708888cf496a1d0bd5711b02b08cc0523581 │ │ └─6878 /pause │ ├─074d1530411288715da24dbdb8b26f7ddce1944008097ab446a8fc7a6839710f │ │ └─4565 /pause │ ├─68c5160a77af8dd6f4f77cc68bceb780c5e8162f812ef33a569b48c2b6bc6d81 │ │ └─14286 /bin/memcached_exporter │ ├─49db6c998a7f44f59fd7d6a734fc048c9a9a1373f7225a6374764b42bad924e7 │ │ └─4745 etcd --advertise-client-urls=https://199.204.45.70:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.70:2380 --initial-cluster=instance=https://199.204.45.70:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.70:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.70:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─277a93f5b14874101d17efdc98247cdd6b09b3ca09cb3348697e578f27863f42 │ │ └─4616 /pause │ ├─c9c8ee8fbb8752ba2f567c7427c50e78f66e9fcd8b617f5a46c846648ef45c8e │ │ └─13878 /pause │ ├─33021e33cd5b61a21ea95e327af7a8298de76dc078b5c2282e446c2ff78ffc5b │ │ └─7629 /pause │ ├─6a2b5418e6e175cb9e2c7b0ef98a1168b04c2bb427f72f4944bd4aaf3062bc22 │ │ └─11461 /pause │ ├─9f8fd0ce4ca6e72a26e7c0e99052ea3c2ebf1b6038c18eb55f55db81add903b7 │ │ ├─6133 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6464 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─a386338781780d75a6934bb6328eabd724b82306f4816e7fda5e44d3eaacb111 │ │ └─4497 /pause │ ├─b0f73b58709bbd9287695ab87697e6eb29e22bc219a94321b97da768b10713f2 │ │ ├─10635 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10648 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10757 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─17888 nginx: worker process │ │ ├─17889 nginx: worker process │ │ └─17890 nginx: cache manager process │ ├─32700585ce5cdd30ea3b0705d0f75a79de6d202a34a0bf3d9f5bba6820f1b894 │ │ └─5720 /pause │ ├─83fd89798523b14f5a2b54697d7eb0c6abd7558e352250c6a51cbf76ed6955ce │ │ └─4699 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─6eb676645046c38a276cc5bc6d6c2b328bd19f3b3dbd239c29ffac4bf1d81a51 │ │ └─4625 /pause │ ├─83e46b742ea53128e99e2846f5c5aec489e9560d8eefe84de9fba002f22f4101 │ │ └─17861 /pause │ ├─d3324b61dad1a507b220fec3a390870a3cee5a8f267e3f36663a617609090202 │ │ └─5935 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─f38df10ce21db435345918f23172dde27b4803b768c3f4fda7967e1fc60bc9c6 │ │ └─5020 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─feca4e7c162e0f28293a0d11ca1ea764ff7c57a4bb160058ef4ab7614445fe4c │ │ └─11581 percona-xtradb-cluster-operator │ ├─577d646d573234b082378b5c342cfcce48095ff68982d0dc372f2a3a6f91781f │ │ └─11214 /manager --metrics-bind-address=:9782 │ ├─6bb3df8560f44c6d2b1981065e6caae8f099582766cee9a29d87093e90ac891a │ │ └─11309 /manager --metrics-bind-address=:8080 │ ├─86d7b64b55a6fded0534f7aa100584d39c4b5724f4d758930166f1e32e5d8c7a │ │ └─10352 /pause │ ├─98e49adfc33d6aed8521d0819b127bf8810f803a1f2a263fee1dbd79bd2f0f08 │ │ └─4709 kube-apiserver --advertise-address=199.204.45.70 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─a8279481ec232acff9be288ceca2d90391f165c9f12bec24523c7ba96ff0fe9e │ │ └─4995 /pause │ ├─402af5940d5429deb1da901cdd45614865a2b8430678e9618c890949badc830f │ │ ├─12314 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─14852 haproxy -sf 144 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─9ddcfe357583cad0259268744005e889081dc132b12ccb89c990b8c4bac359c4 │ │ └─12288 /pause │ ├─c752ac4035abef41cc47827b5071569a7225e8f3389b944996d0b45357f195e1 │ │ └─8174 /pause │ ├─57988effd977e9616229f9a806b6013d4d983d2f4d1bbb027e66a148c26587ca │ │ ├─12467 mysqld --wsrep_start_position=c9aa43aa-3295-11f1-93e5-9b0861ebb589:20 │ │ └─12612 /var/lib/mysql/mysql-state-monitor │ ├─e1d3dcedddfbb1e1b4a5cd64c611751175b74c1c4a629d0a00a5446658b36659 │ │ └─7328 /coredns -conf /etc/coredns/Corefile │ ├─c3813c46f91714dc48e39a67982e1593d6975834d11c24bfd10301fa1bfbc265 │ │ └─12587 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─640e3eff671f20ab3ed7422ead1f375202d3c68e0e62365143a50315eff43880 │ │ └─6910 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─bb98cbf17db70449ea12119f9ce439e81bd14b3d70739fa510860c2521bc702e │ │ └─14243 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─ead1aa6efd58ff01ebbb56e51e7ae44890f0bbdb8e2aeb15ea2c197403540351 │ │ └─14506 /pause │ ├─e4cc7511878f93ab7b6ea15d0884075a3a5ef3d2627eeda5e61d62760b13e705 │ │ └─8284 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─b20e11fbce9171f69395571c9ecd675649d77780bb1021ea814d9563c0e90635 │ │ └─7681 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─689ba2e6b004ae0964e29570e3885083f95ca763633236e4340e7919aa6100da │ │ └─11074 /pause │ ├─c0c770eb8d255fe34794bcbe70989f60c7c8256c0873c1c35029e25817791a33 │ │ └─4593 /pause │ ├─30c73ed310d8ac118edea538ed9ee3d6be8a06ff2676c53052c13c4a4aa96d0a │ │ └─7251 /pause │ ├─39cfc67684341f5298a3e1c4aa584c06b20f32623bda34e1677ab70a3f1154b0 │ │ └─12393 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─2ae2327fc45a52c65826177ccfa44499dd8a9eb5ee21325403e95f9429a4db19 │ │ └─7280 /pause │ ├─7dc9f05307343ae574cc01d171c6e3dfc0f9a387bcf2cb3f0a69a9c6d217a4c4 │ │ └─7312 /coredns -conf /etc/coredns/Corefile │ ├─a8d8c91cf567d65816e5d83336f271d6ec6cca0f8e795f0ee3243810b7d60e83 │ │ └─10680 /server │ ├─596598c59611261a4b1584d37b86cc0de0acc87736d6255b09fb81e7c3f90cec │ │ └─4834 /kube-vip manager │ ├─01a03d220adeac0a4549ab79f817c96bc8067c4b2eb6e74d7277901909be130d │ │ └─8321 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─9a07dd8036028fc23d7cca926e040a2f1d191cec46c9275be7e9df705a2fd39f │ │ └─4732 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ └─f707316e6d69dca67e12d80e1e78c7a4eeac415a69c99f08c715ccf472ae2d5b │ └─8156 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount