Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─614 /lib/systemd/systemd --user │ │ └─615 (sd-pam) │ ├─session-4.scope │ │ ├─1349 sshd: zuul [priv] │ │ └─1362 sshd: zuul@notty │ └─session-1.scope │ ├─ 611 sshd: zuul [priv] │ ├─ 628 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1353 ssh: /home/zuul/.ansible/cp/199.19.213.140-22-zuul [mux] │ ├─38741 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-retkarostrytlmtktvzrlaeobrvmqcvv ; /usr/bin/python3'"'"' && sleep 0' │ ├─38742 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-retkarostrytlmtktvzrlaeobrvmqcvv ; /usr/bin/python3' && sleep 0 │ ├─38743 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-retkarostrytlmtktvzrlaeobrvmqcvv ; /usr/bin/python3 │ ├─38744 /bin/sh -c echo BECOME-SUCCESS-retkarostrytlmtktvzrlaeobrvmqcvv ; /usr/bin/python3 │ ├─38745 /usr/bin/python3 │ ├─38746 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38748 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2872 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4447 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 100d3eb546df3766b9707185db72dded2330e42c14786a0695f44347e85b3a3c -address /run/containerd/containerd.sock │ │ ├─ 4456 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b2737859188b4959bdb873d4912a43dee6c4bca0eb97c4a622d43aa85af6a00f -address /run/containerd/containerd.sock │ │ ├─ 4495 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 81306b4d5cc828cc401b4eed9926a18e83d7a04c8edd0d5124b7a153022cb13c -address /run/containerd/containerd.sock │ │ ├─ 4497 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b9a6fbdad9998304aa3998bf881b867ce420ad3727994b7cb7f6cfd8b09f6a57 -address /run/containerd/containerd.sock │ │ ├─ 4506 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5596ec2da5145022bf1c6ba650aa4bdb06ab1cc7fa34a0f5763ca834019027ea -address /run/containerd/containerd.sock │ │ ├─ 4992 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2fd0d82c9c08594c0e3702f9ba2984eebd3bd7845b527a7e0e8c9ccb8d3b8230 -address /run/containerd/containerd.sock │ │ ├─ 5671 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d43f4b5cdfdfefbb1e2fb26b20a73d8e29b104192d977bf7750d3bc4d59aa980 -address /run/containerd/containerd.sock │ │ ├─ 5686 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cec7751af0046db26f515a225a9135a31f708d17dfca1c1f05f28fe8607a056a -address /run/containerd/containerd.sock │ │ ├─ 6878 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f9d1ddf5261a8f32cea0fae2d9ce062b5bf8ddf7d29d5a09a215b934604a317b -address /run/containerd/containerd.sock │ │ ├─ 7198 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d8cb800c04519adb49289c422d6c931d73c4ac600248cdfb245dcb31bc33a1e0 -address /run/containerd/containerd.sock │ │ ├─ 7237 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b1c001dacb7520d07147fcc3372f9aeb27da65ff1fac4b87e7bb9f7c4111d655 -address /run/containerd/containerd.sock │ │ ├─ 7590 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 47e9933e21d9ed53feda100bd437d1ac799510bbd2e8f00747dea9372cf2292e -address /run/containerd/containerd.sock │ │ ├─ 8046 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7da9a60d78dd2e1c99710b2ee4444658e198fe3e9e4cb6952138771a8d3b3bd5 -address /run/containerd/containerd.sock │ │ ├─ 8085 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6e2341f1d3eca3090562ab6823c503512e7834a05a0db3270eaeb4cbda06172e -address /run/containerd/containerd.sock │ │ ├─ 8120 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2d2baae8be66c6c065d41bc334102f2bdf0f2fe410ba29c50bda167ae6afb087 -address /run/containerd/containerd.sock │ │ ├─ 9996 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b09f5bda023d6a317eccd1026aedc99cf7e835754f8763d244199cf3436bd117 -address /run/containerd/containerd.sock │ │ ├─10056 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 843fd287d36ed6d63fd326ecf30996f235b9d73ae87e29f1189989b347fe962f -address /run/containerd/containerd.sock │ │ ├─10815 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cd6315fd2137c925fc1d23c97d5b5f3dbc2767b1bc501c8692a8d7c59daf7949 -address /run/containerd/containerd.sock │ │ ├─10917 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e0ae9b7283f4d43ca931122f0eaf8e9f16a4ec1be99d666a8414a50ba0794800 -address /run/containerd/containerd.sock │ │ ├─11225 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ec166cb8af52280eeac6295ce2add3aa329e0e44e9d375b555c65bccbc3dd34e -address /run/containerd/containerd.sock │ │ ├─11539 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a2a5d2feb6791066e836ef4af0c5a6456eaf5fdbb316d43e40978c2398977c7b -address /run/containerd/containerd.sock │ │ ├─11815 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0973274668a541acb6d4c06499b116a31df6ed4995245a1c410fb2525ebfbbfc -address /run/containerd/containerd.sock │ │ ├─13822 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2298c9dd71c6e70c3dab5b189e07e7a7f39fe5219d7de32c9015abc3e4b3f238 -address /run/containerd/containerd.sock │ │ ├─14459 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ef13cd891eefc1180d946ec87ceb08de01cc26e418eb1dc70042d378985ff97c -address /run/containerd/containerd.sock │ │ ├─18488 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bb6464d84a7162e14580d9d6a14640b5f0bc4bd597badc4163c32dabccb48767 -address /run/containerd/containerd.sock │ │ ├─21322 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 908ca3a6a1a8038b2cbce1c024b5c8ea832b6981eefac1375d43469b01950f0b -address /run/containerd/containerd.sock │ │ ├─21367 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 417a071a42af017f4587afdce594b1e8653a05abb49a04e7034727452fb461e1 -address /run/containerd/containerd.sock │ │ ├─21407 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f2db421e14be0b37710da372ab16167132fd2c6d1829ea40cc59bcb92658d821 -address /run/containerd/containerd.sock │ │ ├─21453 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 39acdfcea4040b00d43898ebf20a938742342c1668b5254be310bdf6d4626f56 -address /run/containerd/containerd.sock │ │ ├─22604 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f7c3aaa52f27bd0b55d399e0c20fda8c22afecda5f55ba4a0d655fe2f6c654ae -address /run/containerd/containerd.sock │ │ ├─22703 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 071f321af712d4f37e9487e8c0f1c680acb7c3599f72f502c57a11ba7639da10 -address /run/containerd/containerd.sock │ │ ├─23531 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cdee32c35713ceea11bc6ef7f720184642ac24b16aca28ba6fd859e3ea64ff59 -address /run/containerd/containerd.sock │ │ ├─25088 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ff8868309801c854366979f12b32467c1a7fe24957089b068d2e17ac698565bb -address /run/containerd/containerd.sock │ │ ├─30407 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9e45a2c9de2a18b0138c0f4fdcd44523b48651d5084a4abeb3e017d4402f4def -address /run/containerd/containerd.sock │ │ ├─30460 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9af8c42a5a3257b8b25e37e9806da9c08823c2ac6f2c993fd69ed4dc30fc11cf -address /run/containerd/containerd.sock │ │ └─30520 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ee098b38317e2cf8c126dcb082e6728c6866d2b8d457c92964df5d35777fbc34 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1091 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─433 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─325 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─535 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─550 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─529 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4879 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.19.213.140 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─291 /lib/systemd/systemd-journald │ ├─ssh.service │ │ ├─ 562 sshd: /usr/sbin/sshd -D [listener] 1 of 10-100 startups │ │ ├─38253 sshd: root [priv] │ │ └─38254 sshd: root [net] │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1284 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─349 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─525 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─360 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─534 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─531 /lib/systemd/systemd-logind ├─k8s.io │ ├─39acdfcea4040b00d43898ebf20a938742342c1668b5254be310bdf6d4626f56 │ │ └─21479 /pause │ ├─f7c3aaa52f27bd0b55d399e0c20fda8c22afecda5f55ba4a0d655fe2f6c654ae │ │ └─22640 /pause │ ├─cc8ad13219b6527c1785b7db61f98a6cc9fa6baa2ca126786506df250346af11 │ │ └─11080 /manager --metrics-bind-address=:8080 │ ├─a2a5d2feb6791066e836ef4af0c5a6456eaf5fdbb316d43e40978c2398977c7b │ │ └─11564 /pause │ ├─75794f7f68ecdbe2f8e4e170a6b849f74af9a4905af6d920c013fe5051511501 │ │ └─24134 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─417a071a42af017f4587afdce594b1e8653a05abb49a04e7034727452fb461e1 │ │ └─21391 /pause │ ├─843fd287d36ed6d63fd326ecf30996f235b9d73ae87e29f1189989b347fe962f │ │ └─10079 /pause │ ├─cec7751af0046db26f515a225a9135a31f708d17dfca1c1f05f28fe8607a056a │ │ └─5726 /pause │ ├─071f321af712d4f37e9487e8c0f1c680acb7c3599f72f502c57a11ba7639da10 │ │ └─22727 /pause │ ├─194f53ce9c5d30311b2c4f65b4ddb65d9f4512fe659a300d99453d27204f120b │ │ └─4742 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─868f3e5a7b71faa750f7f8ee7ddb4cd8b86f714b4fa13b4fbe07a3ca72706a4f │ │ └─4722 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─ee098b38317e2cf8c126dcb082e6728c6866d2b8d457c92964df5d35777fbc34 │ │ └─30553 /pause │ ├─b1c001dacb7520d07147fcc3372f9aeb27da65ff1fac4b87e7bb9f7c4111d655 │ │ └─7261 /pause │ ├─b2737859188b4959bdb873d4912a43dee6c4bca0eb97c4a622d43aa85af6a00f │ │ └─4604 /pause │ ├─d43f4b5cdfdfefbb1e2fb26b20a73d8e29b104192d977bf7750d3bc4d59aa980 │ │ └─5724 /pause │ ├─c6521cfa846984f4764d0d0d3167c22d9e222613a66ff789f529f767405f1067 │ │ ├─23885 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23902 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-13.2.2.11/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -enable-feature maybe_expr │ │ ├─23908 erl_child_setup 1048576 │ │ ├─23988 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─23989 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/inet_gethost 4 │ │ ├─23999 /opt/erlang/lib/erlang/erts-13.2.2.11/bin/epmd -daemon │ │ └─24262 /bin/sh -s rabbit_disk_monitor │ ├─9e45a2c9de2a18b0138c0f4fdcd44523b48651d5084a4abeb3e017d4402f4def │ │ └─30434 /pause │ ├─cdee32c35713ceea11bc6ef7f720184642ac24b16aca28ba6fd859e3ea64ff59 │ │ └─23556 /pause │ ├─e030b7814f747efddb45eb4757837033de8ff1d32f5f69698637882359cd8e6a │ │ └─7713 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─6b179e6c1b3e2c09e6cbf0030bf240a845fba6cda1a65fe4610b5b8f12356f08 │ │ └─8300 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─0973274668a541acb6d4c06499b116a31df6ed4995245a1c410fb2525ebfbbfc │ │ └─11841 /pause │ ├─f2db421e14be0b37710da372ab16167132fd2c6d1829ea40cc59bcb92658d821 │ │ └─21434 /pause │ ├─715283330388ab1880e719c064b922bf138f463654430bd0a879fc140f9c280d │ │ └─10465 /server │ ├─5596ec2da5145022bf1c6ba650aa4bdb06ab1cc7fa34a0f5763ca834019027ea │ │ └─4622 /pause │ ├─cd6315fd2137c925fc1d23c97d5b5f3dbc2767b1bc501c8692a8d7c59daf7949 │ │ └─10840 /pause │ ├─04ae202e2ec6dbbfd5636ce52bc26413e7c5824da3f5197c5bff2ed8012e507b │ │ └─6935 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─100d3eb546df3766b9707185db72dded2330e42c14786a0695f44347e85b3a3c │ │ └─4558 /pause │ ├─f03b3f13ce1c205e84a97bf3e33f4772e6e236695ff1537ab526e371e5930c2c │ │ └─11370 percona-xtradb-cluster-operator │ ├─e0ae9b7283f4d43ca931122f0eaf8e9f16a4ec1be99d666a8414a50ba0794800 │ │ └─10940 /pause │ ├─7206f60257ccde52f96c667f81d6553e3f3217165e2f2081ca1a6a9fdc5c6f7c │ │ ├─22383 python -u /app/sidecar.py │ │ ├─22739 python -u /app/sidecar.py │ │ └─22740 python -u /app/sidecar.py │ ├─2d2baae8be66c6c065d41bc334102f2bdf0f2fe410ba29c50bda167ae6afb087 │ │ └─8146 /pause │ ├─97ec22b63e59f93eae1f99cbefee1d33530dfab43d9f38117ec9774121526dd7 │ │ └─5940 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─b9a6fbdad9998304aa3998bf881b867ce420ad3727994b7cb7f6cfd8b09f6a57 │ │ └─4602 /pause │ ├─9af8c42a5a3257b8b25e37e9806da9c08823c2ac6f2c993fd69ed4dc30fc11cf │ │ └─30499 /pause │ ├─2e807d4795fcb97ab3f8456b032083310f8b9d9c387425ccbed0d992c51001b5 │ │ └─18554 /secretgen-controller │ ├─2298c9dd71c6e70c3dab5b189e07e7a7f39fe5219d7de32c9015abc3e4b3f238 │ │ └─13845 /pause │ ├─b46e193088bc8e2b9c10c82b20dc6ce3c6433c9fae962ac66d9e4e21cae7896e │ │ └─23631 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─bb032fc07c71b6eebf1152f06004a1c45801d1222c7b0f47a3effe15df29edc6 │ │ └─14377 /bin/memcached_exporter │ ├─db5d851201b5b0bc23c6a4852eed35b8a1b4e76a8208d94498b900bbda368722 │ │ └─24187 /bin/oauth2-proxy │ ├─1bd9bad47a4a18513a6c17e3105d6de2afa466e5ae2d5d1fe866ebf389957b2c │ │ └─8336 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─c622b87c9bffb4a60e9f0c34f7854bcd3f25ac1ba3ffe0d973fc3d9ba3da385d │ │ └─23283 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─10b61371c16f29bc9f89b6b839335065702f6e33ca4048af76d7490192943bc1 │ │ └─24168 /bin/oauth2-proxy │ ├─a95c3fa84bd245fd9b815cb532aa4569cc638e052064cc47f74d72cca56cbd4d │ │ └─22753 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─f3625a5d6d77300bc1da190cab6947512a0a22a1ab48bef3ee1bdbc8c9367e88 │ │ └─4687 kube-apiserver --advertise-address=199.19.213.140 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─b34a17e8c76853c42b315a16fe549618b1f770dfec887e9df643c36b0784cecf │ │ └─8262 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─2c49c8c4bb90f8e1feae0b12f1d825af718c7d6c2aab99eaece4f1012c7f9eaf │ │ └─24095 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─acf10621c5f85f01911b859ca990e99d55894df77d5be6def716dad9786fea51 │ │ └─12255 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─eeed0601c143a12696de3457379c748b47dbda3040fbb17680e7d811cf5a8399 │ │ └─7314 /coredns -conf /etc/coredns/Corefile │ ├─b09f5bda023d6a317eccd1026aedc99cf7e835754f8763d244199cf3436bd117 │ │ └─10024 /pause │ ├─47e9933e21d9ed53feda100bd437d1ac799510bbd2e8f00747dea9372cf2292e │ │ └─7615 /pause │ ├─060063b7a2ce6c00a5ea661f909deec96696981d35e839604ded83f18461afca │ │ └─10985 /manager --metrics-bind-address=:9782 │ ├─6e2341f1d3eca3090562ab6823c503512e7834a05a0db3270eaeb4cbda06172e │ │ └─8112 /pause │ ├─ec166cb8af52280eeac6295ce2add3aa329e0e44e9d375b555c65bccbc3dd34e │ │ └─11248 /pause │ ├─1109843ca3bac6169a32bd0ce358634901af4b906f97fa9c940a22c810a1c576 │ │ └─12139 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─97c25bd9476a383616e4af87733b273a27e9765bacb84c78702f40d66219bb74 │ │ └─23702 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─3239a82a593da7c945514acaf65210751d2f52c0e7ff8d266b009675a1613730 │ │ ├─6142 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6497 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─ddaf20e490f3ac48f1a8c5eb5ba40eb20970368a0cc8fc8304a971dece4fca97 │ │ ├─11998 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13424 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─60e213871fcbf6f6ba8500cb63741e1234b6b2782c537efa551e52dc899c2f55 │ │ └─24061 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-19-213-140.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─0534bc8d678d9f0cc52b8f624bb48dca3aea0e89dfa45974af3c25790a399892 │ │ ├─31774 apache2 -DFOREGROUND │ │ ├─34281 (wsgi:h -DFOREGROUND │ │ ├─34282 (wsgi:h -DFOREGROUND │ │ ├─34283 (wsgi:h -DFOREGROUND │ │ ├─34284 (wsgi:h -DFOREGROUND │ │ ├─34285 (wsgi:h -DFOREGROUND │ │ ├─34286 apache2 -DFOREGROUND │ │ └─34287 apache2 -DFOREGROUND │ ├─448f19f0f56d129f451dea20e278747b507ce725f1173adc05d23dae487b9215 │ │ └─4834 /kube-vip manager │ ├─78ac3b8fed77fd3b32e26c5c3eab01a3ddd3d83ec28e94d8f579404916e5277a │ │ └─14603 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─2fd0d82c9c08594c0e3702f9ba2984eebd3bd7845b527a7e0e8c9ccb8d3b8230 │ │ └─5017 /pause │ ├─81306b4d5cc828cc401b4eed9926a18e83d7a04c8edd0d5124b7a153022cb13c │ │ └─4583 /pause │ ├─4d496e1f19276233b7540a60d64546b93b1e68df23bbb9d2a39ebfb365acab77 │ │ ├─10419 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10432 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10565 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─31525 nginx: worker process │ │ ├─31526 nginx: worker process │ │ └─31527 nginx: cache manager process │ ├─5883354148432bd1e876cf0aab8bbd7e56a9bce0cd8a64773f271784dfad3e5b │ │ ├─27348 apache2 -DFOREGROUND │ │ ├─27374 (wsgi:k -DFOREGROUND │ │ ├─27375 (wsgi:k -DFOREGROUND │ │ ├─27376 (wsgi:k -DFOREGROUND │ │ ├─27377 (wsgi:k -DFOREGROUND │ │ ├─27378 apache2 -DFOREGROUND │ │ ├─27382 apache2 -DFOREGROUND │ │ ├─27383 apache2 -DFOREGROUND │ │ ├─27385 apache2 -DFOREGROUND │ │ ├─27386 apache2 -DFOREGROUND │ │ ├─27387 apache2 -DFOREGROUND │ │ ├─27389 apache2 -DFOREGROUND │ │ ├─27391 apache2 -DFOREGROUND │ │ ├─27392 apache2 -DFOREGROUND │ │ └─27393 apache2 -DFOREGROUND │ ├─2ce0c60d34cc7000fb7f2b5c580b2b4db5857bf2072460738760f0d99a19f035 │ │ ├─31749 apache2 -DFOREGROUND │ │ ├─33999 (wsgi:h -DFOREGROUND │ │ ├─34000 (wsgi:h -DFOREGROUND │ │ ├─34001 (wsgi:h -DFOREGROUND │ │ ├─34002 (wsgi:h -DFOREGROUND │ │ ├─34003 (wsgi:h -DFOREGROUND │ │ ├─34004 apache2 -DFOREGROUND │ │ └─34005 apache2 -DFOREGROUND │ ├─a02631b78edaec0dc84c6fc6b903f78a78d3556b96dd3e265bec1fb59af5e506 │ │ ├─31801 apache2 -DFOREGROUND │ │ ├─34170 (wsgi:h -DFOREGROUND │ │ ├─34171 (wsgi:h -DFOREGROUND │ │ ├─34172 (wsgi:h -DFOREGROUND │ │ ├─34175 (wsgi:h -DFOREGROUND │ │ ├─34179 (wsgi:h -DFOREGROUND │ │ ├─34180 apache2 -DFOREGROUND │ │ └─34181 apache2 -DFOREGROUND │ ├─c81529874cc55c830ae3dccd9f37aae1de0378d4d46263cf4b66672e65f45d4e │ │ └─7293 /coredns -conf /etc/coredns/Corefile │ ├─4fba3f7113f58e87ec3a0a946d49de0b4e797be7b2fe05d98df9aa78374ffd76 │ │ ├─22342 python -u /app/sidecar.py │ │ ├─22535 python -u /app/sidecar.py │ │ └─22536 python -u /app/sidecar.py │ ├─87c3a051c4ba0e60bf8804c27fde7e0ffc39d502b307ab52740923b36a00fde8 │ │ └─14252 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─60e5cb53c3a2a4c3e8250cb7c0fd22436500af82ca122a57b912d74fb4f336bd │ │ └─22054 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─7da9a60d78dd2e1c99710b2ee4444658e198fe3e9e4cb6952138771a8d3b3bd5 │ │ └─8074 /pause │ ├─115c5836c27cfac6c041aaf18f60b589e8f7a21a436ef86f32d5d49f7affb8aa │ │ └─21857 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─f9d1ddf5261a8f32cea0fae2d9ce062b5bf8ddf7d29d5a09a215b934604a317b │ │ └─6906 /pause │ ├─b0ec5b7794b6d8ca0170e403df61a666341b28cb6e3d66e25b64b50385583837 │ │ └─23596 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-19-213-140.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─908ca3a6a1a8038b2cbce1c024b5c8ea832b6981eefac1375d43469b01950f0b │ │ └─21346 /pause │ ├─5fc4774d8010f0a9ba729e0b203b7194db139a8387043d154fb134fd812756ac │ │ ├─12043 mysqld --wsrep_start_position=71b54588-3bdf-11f1-b056-377b9942f0df:20 │ │ └─12168 /var/lib/mysql/mysql-state-monitor │ ├─d8cb800c04519adb49289c422d6c931d73c4ac600248cdfb245dcb31bc33a1e0 │ │ └─7221 /pause │ ├─ff8868309801c854366979f12b32467c1a7fe24957089b068d2e17ac698565bb │ │ └─25112 /pause │ ├─9199745ba6d8f9d3f23227bd7d896e47c8026b63eaa2c5f09499885be821da28 │ │ └─5043 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─ef13cd891eefc1180d946ec87ceb08de01cc26e418eb1dc70042d378985ff97c │ │ └─14485 /pause │ ├─a717edef15cf85f6a21b582f5fb132f20870ad06a13539a19f1b8d6748853a1e │ │ └─4704 etcd --advertise-client-urls=https://199.19.213.140:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.19.213.140:2380 --initial-cluster=instance=https://199.19.213.140:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.19.213.140:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.19.213.140:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ └─bb6464d84a7162e14580d9d6a14640b5f0bc4bd597badc4163c32dabccb48767 │ └─18512 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount