Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ ├─user-1002.slice │ │ └─user@1002.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─16749 /lib/systemd/systemd --user │ │ └─16750 (sd-pam) │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─616 /lib/systemd/systemd --user │ │ └─617 (sd-pam) │ ├─session-4.scope │ │ ├─1427 sshd: zuul [priv] │ │ └─1440 sshd: zuul@notty │ └─session-1.scope │ ├─ 613 sshd: zuul [priv] │ ├─ 630 sshd: zuul@notty │ ├─ 767 /usr/bin/python3 │ ├─ 1431 ssh: /home/zuul/.ansible/cp/199.204.45.23-22-zuul [mux] │ ├─16798 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-jymdudbyfggszwqadwxnzdrkkkgueabq ; /usr/bin/python3'"'"' && sleep 0' │ ├─16799 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-jymdudbyfggszwqadwxnzdrkkkgueabq ; /usr/bin/python3' && sleep 0 │ ├─16800 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-jymdudbyfggszwqadwxnzdrkkkgueabq ; /usr/bin/python3 │ ├─16801 /bin/sh -c echo BECOME-SUCCESS-jymdudbyfggszwqadwxnzdrkkkgueabq ; /usr/bin/python3 │ ├─16802 /usr/bin/python3 │ ├─16803 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─16805 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 42 nofb ├─system.slice │ ├─containerd.service … │ │ ├─10463 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─12053 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 75b2a728b77ac4c921eb60f8aed1628a52144a76f80c005dfd90f6a4344244ce -address /run/containerd/containerd.sock │ │ ├─12054 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 254ada5fca53f952cf72c9ca35ac38e6ef0c38e61710f5425b6671d8b5857013 -address /run/containerd/containerd.sock │ │ ├─12083 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bdc0c7f26f11b2a605c41872d228c134cbc11ee5a0915320fcdb5a68973ff0bd -address /run/containerd/containerd.sock │ │ ├─12096 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3501fec855bcb95ee7b71e63690bbbca74e38929e3c2ca79f6e5054d1dc33659 -address /run/containerd/containerd.sock │ │ ├─12118 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cf1f2003a6d8c3323942426d5047ff93544fee39aae6924956bd236c394031a6 -address /run/containerd/containerd.sock │ │ ├─12586 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2e341cd5e6ca990a6a908733bcdc6694dd0a7cd40b4a67a59238f1b6663c11f8 -address /run/containerd/containerd.sock │ │ ├─13263 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8181a99fed76e116b2d31cbe2411ba89447b929d68c4a9509305af8898666110 -address /run/containerd/containerd.sock │ │ ├─13276 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eae959293e6764b0ed67a3fa2e84db2d5d6e85b9813019d16950a5212f78464e -address /run/containerd/containerd.sock │ │ ├─14751 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dc541c40700a3a788c95b5dc5fe1ff8482af5898759d98da3aba97ef2651c23e -address /run/containerd/containerd.sock │ │ ├─15106 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5326eaf95b16e9dcdcdb33701e211ccf5c13782734fd8104aedd9f24704c28f3 -address /run/containerd/containerd.sock │ │ └─15140 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fa64c78e511dfe7f5ea3cdceb63538184e8bba339c2883cf6827a39bbf18a45c -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1090 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─328 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─542 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─docker.service … │ │ └─16061 /usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock │ ├─polkit.service │ │ └─559 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─532 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─12475 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.23 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─295 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─563 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1360 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─chrony.service │ │ ├─16559 /usr/sbin/chronyd -F 1 │ │ └─16560 /usr/sbin/chronyd -F 1 │ ├─docker.socket │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─system-lvm2\x2dpvscan.slice │ ├─cloud-init.service │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─538 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─dc541c40700a3a788c95b5dc5fe1ff8482af5898759d98da3aba97ef2651c23e │ │ └─14776 /pause │ ├─2e341cd5e6ca990a6a908733bcdc6694dd0a7cd40b4a67a59238f1b6663c11f8 │ │ └─12610 /pause │ ├─fa64c78e511dfe7f5ea3cdceb63538184e8bba339c2883cf6827a39bbf18a45c │ │ └─15168 /pause │ ├─8181a99fed76e116b2d31cbe2411ba89447b929d68c4a9509305af8898666110 │ │ └─13311 /pause │ ├─5f850555b03d303424bfabbedac968c73f619c66207d16dc52dc05d8af50610d │ │ └─12637 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─a57f71e7847e9b47d820328a058974fc20666b8ad0bfae8be650b30d6a6f3cf5 │ │ └─12306 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─254ada5fca53f952cf72c9ca35ac38e6ef0c38e61710f5425b6671d8b5857013 │ │ └─12159 /pause │ ├─c3586fee6ce4171845d6e26c1e5a84b430aeeeba01b428e9d494dddd4e8a5a1b │ │ └─12338 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─eae959293e6764b0ed67a3fa2e84db2d5d6e85b9813019d16950a5212f78464e │ │ └─13324 /pause │ ├─88d1a439bb90628b194c21fbf723e87e7a19fe33a8b5d434668ba9bc894d9a01 │ │ └─13803 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─5326eaf95b16e9dcdcdb33701e211ccf5c13782734fd8104aedd9f24704c28f3 │ │ └─15138 /pause │ ├─6757aef834b252c4ec36f537261cb2b42d548b37a64e1767cd71d7f06fcafc9f │ │ └─15219 /coredns -conf /etc/coredns/Corefile │ ├─44313ff219e1206315ad4648b8f2b42748d767b96166b69f2969e79780d90970 │ │ └─12280 etcd --advertise-client-urls=https://199.204.45.23:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.23:2380 --initial-cluster=instance=https://199.204.45.23:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.23:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.23:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─9dffa7a99d2294abaf23fc222491ab9703458dd71dabff85fc09d0d4efd4ba1b │ │ ├─14011 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─14345 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─75b2a728b77ac4c921eb60f8aed1628a52144a76f80c005dfd90f6a4344244ce │ │ └─12209 /pause │ ├─4f751db7bc5e155f1130b9145c55440749eab60dea6ad6e13f819ee7b36b79f4 │ │ └─15201 /coredns -conf /etc/coredns/Corefile │ ├─3501fec855bcb95ee7b71e63690bbbca74e38929e3c2ca79f6e5054d1dc33659 │ │ └─12218 /pause │ ├─84ae42172593d87c223add7b87da35b804e69680cb35b99fb79482d089f84647 │ │ └─14812 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─5118f040b7720d07b5246e48512f44695e47a71533b6ffcdb88beb624180a591 │ │ └─12427 /kube-vip manager │ ├─91290f3534f5f61744b023f6586fe0975c3140e325bdff8950d0ac43bfb34658 │ │ └─12324 kube-apiserver --advertise-address=199.204.45.23 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─bdc0c7f26f11b2a605c41872d228c134cbc11ee5a0915320fcdb5a68973ff0bd │ │ └─12172 /pause │ └─cf1f2003a6d8c3323942426d5047ff93544fee39aae6924956bd236c394031a6 │ └─12201 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount