Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─618 /lib/systemd/systemd --user │ │ └─619 (sd-pam) │ ├─session-4.scope │ │ ├─1514 sshd: zuul [priv] │ │ └─1527 sshd: zuul@notty │ └─session-1.scope │ ├─ 615 sshd: zuul [priv] │ ├─ 632 sshd: zuul@notty │ ├─ 769 /usr/bin/python3 │ ├─ 1518 ssh: /home/zuul/.ansible/cp/199.204.45.140-22-zuul [mux] │ ├─58534 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-ngxwoskogqodqbwkbfytbgupafhebeiu ; /usr/bin/python3'"'"' && sleep 0' │ ├─58535 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-ngxwoskogqodqbwkbfytbgupafhebeiu ; /usr/bin/python3' && sleep 0 │ ├─58536 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-ngxwoskogqodqbwkbfytbgupafhebeiu ; /usr/bin/python3 │ ├─58537 /bin/sh -c echo BECOME-SUCCESS-ngxwoskogqodqbwkbfytbgupafhebeiu ; /usr/bin/python3 │ ├─58538 /usr/bin/python3 │ ├─58539 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─58541 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 3035 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4602 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cc464130b32929c7339e9d725b198a5b7338f24168239060e0ac5cc94fe39f72 -address /run/containerd/containerd.sock │ │ ├─ 4645 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5a17a34b5cac25e0f4497f569f673848cd02f46cc77de3720b77a52bdfda048f -address /run/containerd/containerd.sock │ │ ├─ 4689 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5d87cfe37141e3d28c8c54698985fd0cdf21132d79e91e801c5cb7ddc5c1fdda -address /run/containerd/containerd.sock │ │ ├─ 4735 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d0d1df26da063bebdd3e3706fc5eff2c2fc5f4544abcfac49a253b21338ec5d3 -address /run/containerd/containerd.sock │ │ ├─ 4782 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7240c21bdbb74c8417d6507be115678fe096b56098edccff8110934f3c7e5acf -address /run/containerd/containerd.sock │ │ ├─ 5146 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0526f8139cafe86fdbcf2e90d44dabf1053ea33ce43d167aa89a3b363e079be5 -address /run/containerd/containerd.sock │ │ ├─ 5778 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9804044baa934e6f2ac9273d51832d931a5946c52f8a33ae1ba223195fbb14fc -address /run/containerd/containerd.sock │ │ ├─ 5804 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5c5fb87a91eb562d28eb020904525cb4a9e8210363ac2924d1b246260fe0c5c5 -address /run/containerd/containerd.sock │ │ ├─ 7380 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 61c8eff911e4020ef3f6bacc2ff1a73ecd103e2d7ab6960387f015d048793469 -address /run/containerd/containerd.sock │ │ ├─ 7729 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 154baa5fe81c19e2826f268ca4aa13ae8f85d92500a0fec43c81557619109a92 -address /run/containerd/containerd.sock │ │ ├─ 7766 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 83160faf7ffc613d69ec4b6b8b9a2dd6f7eb6c609aff82d7d9bb3ff294f03dcd -address /run/containerd/containerd.sock │ │ ├─ 8117 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ab5871ff64f654ca25e2d7be26182046c84fb5d60f5d6d4d1053fc0c25e66e75 -address /run/containerd/containerd.sock │ │ ├─12747 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 285de5b46f4e7df588d7bb7bbaa0b8edd0589025d999e8dac6e0fa028fc8c50b -address /run/containerd/containerd.sock │ │ ├─12920 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bc1baca82113d1d3cd756db724d0a1bf7d04dc426caee24caf06e6c828e434b4 -address /run/containerd/containerd.sock │ │ ├─12958 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 27c3a27d765439e396af417abdc2859aace26a98e83ba4e6d4cae63a666ebeb8 -address /run/containerd/containerd.sock │ │ ├─13000 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d9af75c6b3f1ac961d1e7160b59469e06142db9a5fbb86928b214cabed9e3197 -address /run/containerd/containerd.sock │ │ ├─13505 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e841824d8ffe9f571e4dc248b7e8d17aa8105bacbaa3acb1d2eaa6d5f1552185 -address /run/containerd/containerd.sock │ │ ├─13589 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 578a13e0b401db597b2d8e40e80f90241435f08db1472153b91764ab81160ea2 -address /run/containerd/containerd.sock │ │ ├─16260 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d529bad1452cc76ad321b76506242994e0361fbfc04b999707d7153a9964bb9f -address /run/containerd/containerd.sock │ │ ├─16400 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 241f7f2f6b4e9554036989e24d4351041485e6c4840d0dec74e79c5750e70a04 -address /run/containerd/containerd.sock │ │ ├─16594 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1c90e2c2224809dfa3a4b40abec97f7c661f7f17c816f0c7007ed672a9dc1e44 -address /run/containerd/containerd.sock │ │ ├─17223 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3d2ea03ea6fdc8629107be8eec5a0256b923e302e553bef56967be50d190683f -address /run/containerd/containerd.sock │ │ ├─17841 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b829e79d124e48801a6a44dc77e532884a77420b35da81fb2f6b9cc2deaebc37 -address /run/containerd/containerd.sock │ │ ├─17888 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f961580be14e71985b916c7b0896bfad05e8d758b8246a19e6fdc894749f62d3 -address /run/containerd/containerd.sock │ │ ├─20422 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4c94f0da840eee652a896e6882324a5a41b8efe0b5aa8a54fb207b3434067fbb -address /run/containerd/containerd.sock │ │ ├─25587 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d7f97af2eda8e9122dcbf7ac6fc401e376c2f551c6e8c2b4f33a4367e6b1696b -address /run/containerd/containerd.sock │ │ ├─26305 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ebc3abb11f262197e22bfde49368466f681802ff4dcbe1b104e8c08aa59eec80 -address /run/containerd/containerd.sock │ │ ├─28372 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 52a1641e5d6bbf90867cc0b6c119b94a30e389b038f187799e5ae0f8323f1263 -address /run/containerd/containerd.sock │ │ ├─33017 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a32ebcdd67a43295fcb25defa5d092034c7e87a5342127a81c92adca83975aa8 -address /run/containerd/containerd.sock │ │ ├─33093 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 90e08f4c718a68ee04a9810bdd28ef925f37125ca81932f578f5655c72389d46 -address /run/containerd/containerd.sock │ │ ├─33133 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 36450e8b4891b3dc7814c2c592f4e1668c430699aae1b0ba00581a39c7fc832e -address /run/containerd/containerd.sock │ │ ├─33174 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f08990e56cba4b904178a701ebc59e9936017016960ed1123173c2349dc3741c -address /run/containerd/containerd.sock │ │ ├─34395 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0d8b98325f5d3ec3d854bc228e00c91cd768eddfa8958e7b4c3a51fad30ee75c -address /run/containerd/containerd.sock │ │ ├─34456 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5a69d63b7af402a3d697e5e8c6a667bd39fe12cdaa3c0c0bfdd43344c1296f43 -address /run/containerd/containerd.sock │ │ ├─39310 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 834abaf9f42ea5bfb46328acaae508ea830baac39ac70b5ced12b534587b6f46 -address /run/containerd/containerd.sock │ │ ├─39355 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6581f36cef358007ed560fd628cf88f18ab404ec537deb9d097934029df167e5 -address /run/containerd/containerd.sock │ │ └─39399 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 458b61aba4abb6512677acaa6fcbe7e89862f9cde44706623183255240ec5e74 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1093 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─440 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─328 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─543 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─561 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─535 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─5031 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.140 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─562 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1447 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─334 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─335 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─540 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─9b2f79dd6fe99037fdc53410918767fea03f6dd06649a393597b0ea22ab4dbdf │ │ └─4980 /kube-vip manager │ ├─f03e6266e333d32c6c8f5aa98e26eb20003219688e501a46d1fffd7e9e41ad58 │ │ └─13268 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─0d8b98325f5d3ec3d854bc228e00c91cd768eddfa8958e7b4c3a51fad30ee75c │ │ └─34417 /pause │ ├─bc1baca82113d1d3cd756db724d0a1bf7d04dc426caee24caf06e6c828e434b4 │ │ └─12944 /pause │ ├─d7f97af2eda8e9122dcbf7ac6fc401e376c2f551c6e8c2b4f33a4367e6b1696b │ │ └─25610 /pause │ ├─245cb9c628e741aee445c2c86ca2a1598316da1db23c3360407d4de3c703335c │ │ ├─26792 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─26809 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─26815 erl_child_setup 1048576 │ │ ├─26846 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─26847 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─26857 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─27022 /bin/sh -s rabbit_disk_monitor │ ├─6937c0bd2384e5a3f110d1720c449b967991849684defba63e8eb79c35cf163f │ │ └─35235 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─5c5fb87a91eb562d28eb020904525cb4a9e8210363ac2924d1b246260fe0c5c5 │ │ └─5841 /pause │ ├─ab5871ff64f654ca25e2d7be26182046c84fb5d60f5d6d4d1053fc0c25e66e75 │ │ └─8142 /pause │ ├─4151111b3d21b9977341a11492ff7c4db2a77ae252bc82a78abeb51cebde97ac │ │ ├─6673 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6990 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─458b61aba4abb6512677acaa6fcbe7e89862f9cde44706623183255240ec5e74 │ │ └─39437 /pause │ ├─578a13e0b401db597b2d8e40e80f90241435f08db1472153b91764ab81160ea2 │ │ └─13613 /pause │ ├─5d65e9f678c9193f4ed1ac2c38d4a7937a0bf22f7d79e68190f0f7197b7be809 │ │ ├─34077 python -u /app/sidecar.py │ │ ├─34362 python -u /app/sidecar.py │ │ └─34363 python -u /app/sidecar.py │ ├─04dc3a97bee11b2c8d5b9245eda5b90049e0ac873f659979dd35433d57587a41 │ │ └─25745 /secretgen-controller │ ├─244b67880be00738b2f6a591d285a828db422ad75b4208d94f7b0e482a0a5ded │ │ └─13229 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─f8d5f5b15cf26f5c5f472c3254a87c6edb03e1a5787ac3b4ec878fb013b5d4b5 │ │ └─34888 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─ed81c8ce198a9232ed39b4b45fc353997064bc2dbe4fe0bd90706b497036c830 │ │ └─7842 /coredns -conf /etc/coredns/Corefile │ ├─1d76ec3f210b3f7a012bbcab793e9b99f5191bfc99d7aed1f245dcc8d2d01af2 │ │ └─4942 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─5d87cfe37141e3d28c8c54698985fd0cdf21132d79e91e801c5cb7ddc5c1fdda │ │ └─4714 /pause │ ├─6581f36cef358007ed560fd628cf88f18ab404ec537deb9d097934029df167e5 │ │ └─39378 /pause │ ├─6d5f7c897d89b6de730a37b807d5133eca39e4d90bf9e63e9bcd2591c57af238 │ │ └─17131 /manager --metrics-bind-address=:9782 │ ├─f44ff8a0c6037360ebc67072d3df4c0c8d7c4b4b7120ce40bf340593b1a80d48 │ │ └─34854 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-140.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─b71ed75921ea10f77d16b9c0c1b0a1e134a0c7370c1ee8956f0d535db05ba7af │ │ └─35120 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-140.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─6370638aa5758c3e1ff43b88d8e802997c6324df12a96dabbf8bbbeb6e1974d2 │ │ └─8708 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─d529bad1452cc76ad321b76506242994e0361fbfc04b999707d7153a9964bb9f │ │ └─16286 /pause │ ├─eb307dfc1b38593612428f441b746c49fb762f10af0319733673b53f720efd11 │ │ └─18537 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─e841824d8ffe9f571e4dc248b7e8d17aa8105bacbaa3acb1d2eaa6d5f1552185 │ │ └─13532 /pause │ ├─c97939fafea634f5e400f3850ddd419ccc12ff809e54fe6f066b87c3946abefd │ │ ├─33977 python -u /app/sidecar.py │ │ ├─34204 python -u /app/sidecar.py │ │ └─34205 python -u /app/sidecar.py │ ├─5d8c8e231dba76e1bc10478ae360c16764800c1088390cd280eb1008f57ce749 │ │ └─4878 kube-apiserver --advertise-address=199.204.45.140 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─52a1641e5d6bbf90867cc0b6c119b94a30e389b038f187799e5ae0f8323f1263 │ │ └─28396 /pause │ ├─73ddd97bcbafccad4918fde67fbb354c2abeba3cdd1adf7e8740c95d34a6c46a │ │ └─14542 /bin/memcached_exporter │ ├─e9b032879b4f0fbe9c841649c6011727dc771b298c8d787f046e20e2c7206505 │ │ └─18116 valkey-server *:26379 [sentinel] │ ├─5a69d63b7af402a3d697e5e8c6a667bd39fe12cdaa3c0c0bfdd43344c1296f43 │ │ └─34529 /pause │ ├─a86f3629b6d608141f9c9bf6001002f47c44fc3dca5ae75f9af38a4f07f0fdd9 │ │ └─6472 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─9804044baa934e6f2ac9273d51832d931a5946c52f8a33ae1ba223195fbb14fc │ │ └─5816 /pause │ ├─602fdbb2bd75522ebe50024a268da45253a44719b4b0b1f7295d3a105899bc00 │ │ └─18031 valkey-server *:6379 │ ├─a32ebcdd67a43295fcb25defa5d092034c7e87a5342127a81c92adca83975aa8 │ │ └─33042 /pause │ ├─36450e8b4891b3dc7814c2c592f4e1668c430699aae1b0ba00581a39c7fc832e │ │ └─33168 /pause │ ├─d9af75c6b3f1ac961d1e7160b59469e06142db9a5fbb86928b214cabed9e3197 │ │ └─13029 /pause │ ├─d5923cffb090569617c31a175d2e18a062ad59afea639bbd6a20b0754e1f1470 │ │ └─18323 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─f961580be14e71985b916c7b0896bfad05e8d758b8246a19e6fdc894749f62d3 │ │ └─17911 /pause │ ├─0526f8139cafe86fdbcf2e90d44dabf1053ea33ce43d167aa89a3b363e079be5 │ │ └─5170 /pause │ ├─81a2e283104e547d696283b3c4e07265e8e1e7bd8388784af28697e7cf9e4e58 │ │ └─35339 /bin/oauth2-proxy │ ├─834abaf9f42ea5bfb46328acaae508ea830baac39ac70b5ced12b534587b6f46 │ │ └─39335 /pause │ ├─4c94f0da840eee652a896e6882324a5a41b8efe0b5aa8a54fb207b3434067fbb │ │ └─20446 /pause │ ├─c43556f7acada83da94eaca1c2bcac4c59372d5c9b7bf2ce0e8c4a2abdaceeed │ │ ├─32077 apache2 -DFOREGROUND │ │ ├─32110 (wsgi:k -DFOREGROUND │ │ ├─32111 (wsgi:k -DFOREGROUND │ │ ├─32112 (wsgi:k -DFOREGROUND │ │ ├─32113 (wsgi:k -DFOREGROUND │ │ ├─32114 apache2 -DFOREGROUND │ │ ├─32120 apache2 -DFOREGROUND │ │ ├─32121 apache2 -DFOREGROUND │ │ ├─32123 apache2 -DFOREGROUND │ │ ├─32124 apache2 -DFOREGROUND │ │ ├─32125 apache2 -DFOREGROUND │ │ ├─32126 apache2 -DFOREGROUND │ │ ├─32127 apache2 -DFOREGROUND │ │ ├─32128 apache2 -DFOREGROUND │ │ └─32129 apache2 -DFOREGROUND │ ├─5a17a34b5cac25e0f4497f569f673848cd02f46cc77de3720b77a52bdfda048f │ │ └─4668 /pause │ ├─b8402bf0888176f75f0c99568709e22058b2d08259341679a01cbd58cf48ce4b │ │ └─4833 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─18680bb7f96d07950d74621ceae74d7f8e29bad2ff62d4bbc2aaf9410c0001ef │ │ └─16897 percona-xtradb-cluster-operator │ ├─cc464130b32929c7339e9d725b198a5b7338f24168239060e0ac5cc94fe39f72 │ │ └─4625 /pause │ ├─61c8eff911e4020ef3f6bacc2ff1a73ecd103e2d7ab6960387f015d048793469 │ │ └─7403 /pause │ ├─160c39bbbbef4153010bebdbdc77a3538ca213288df928462bd76d94584740ff │ │ └─4859 etcd --advertise-client-urls=https://199.204.45.140:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.140:2380 --initial-cluster=instance=https://199.204.45.140:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.140:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.140:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─7ba3dc5c4d8ad4dcf08c8d9cf8e19c0f54a35dd439fd35e809a0d46e46078c5d │ │ └─34133 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─3d2ea03ea6fdc8629107be8eec5a0256b923e302e553bef56967be50d190683f │ │ └─17250 /pause │ ├─27c3a27d765439e396af417abdc2859aace26a98e83ba4e6d4cae63a666ebeb8 │ │ └─12984 /pause │ ├─f7a43a8569f32ee14f567d4175d82f328618f8fc633de6b05a7da71017d7fb27 │ │ └─7428 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─5daae5c0d24124cae176b91d3677c72594ab8dc3f37d2f2e893615d60dfcc6e8 │ │ └─17330 /manager --metrics-bind-address=:8080 │ ├─bf3135c033193ed63d4bbce8942f27a9d85d4275c38bc30b52664d796a8ddd2c │ │ ├─41876 apache2 -DFOREGROUND │ │ ├─44235 (wsgi:h -DFOREGROUND │ │ ├─44236 (wsgi:h -DFOREGROUND │ │ ├─44237 (wsgi:h -DFOREGROUND │ │ ├─44238 (wsgi:h -DFOREGROUND │ │ ├─44239 (wsgi:h -DFOREGROUND │ │ ├─44240 apache2 -DFOREGROUND │ │ └─44241 apache2 -DFOREGROUND │ ├─444de81f336c84e6f0deb6554e5b039b3448b35fd7422e072e229975420b5f49 │ │ └─13310 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─154baa5fe81c19e2826f268ca4aa13ae8f85d92500a0fec43c81557619109a92 │ │ └─7757 /pause │ ├─d0d1df26da063bebdd3e3706fc5eff2c2fc5f4544abcfac49a253b21338ec5d3 │ │ └─4759 /pause │ ├─b34145027e798c0aeea271222bf577e7f074debb7cfc2b4d470e6b9a1e6f93c9 │ │ └─35360 /bin/oauth2-proxy │ ├─c151c653fe61f74fbee25ac4e291a9324eaf1d0d26244f63b9ae0c8f95af3834 │ │ ├─18161 mysqld --wsrep_start_position=069f21c7-3760-11f1-a409-5351a844c2fb:20 │ │ └─18256 /var/lib/mysql/mysql-state-monitor │ ├─ebc3abb11f262197e22bfde49368466f681802ff4dcbe1b104e8c08aa59eec80 │ │ └─26330 /pause │ ├─241f7f2f6b4e9554036989e24d4351041485e6c4840d0dec74e79c5750e70a04 │ │ └─16424 /pause │ ├─dd72178fae2417fef18eb3b6081a47a8e82c7d237b23f2ae90e0c1c0fee056dc │ │ ├─41523 apache2 -DFOREGROUND │ │ ├─44315 (wsgi:h -DFOREGROUND │ │ ├─44316 (wsgi:h -DFOREGROUND │ │ ├─44317 (wsgi:h -DFOREGROUND │ │ ├─44318 (wsgi:h -DFOREGROUND │ │ ├─44319 (wsgi:h -DFOREGROUND │ │ ├─44320 apache2 -DFOREGROUND │ │ └─44321 apache2 -DFOREGROUND │ ├─489d49356a6d570986687c4be59eed62f1f4728a6c2c8be2110c31ded8566fc1 │ │ ├─41548 apache2 -DFOREGROUND │ │ ├─44141 (wsgi:h -DFOREGROUND │ │ ├─44142 (wsgi:h -DFOREGROUND │ │ ├─44143 (wsgi:h -DFOREGROUND │ │ ├─44144 (wsgi:h -DFOREGROUND │ │ ├─44145 (wsgi:h -DFOREGROUND │ │ ├─44146 apache2 -DFOREGROUND │ │ └─44147 apache2 -DFOREGROUND │ ├─b829e79d124e48801a6a44dc77e532884a77420b35da81fb2f6b9cc2deaebc37 │ │ └─17865 /pause │ ├─3fe48b619c09ef2e3e1ee1460491c10f41bf7fb7f929b47d5d87a15642576916 │ │ └─18494 redis_exporter │ ├─83160faf7ffc613d69ec4b6b8b9a2dd6f7eb6c609aff82d7d9bb3ff294f03dcd │ │ └─7791 /pause │ ├─f08990e56cba4b904178a701ebc59e9936017016960ed1123173c2349dc3741c │ │ └─33200 /pause │ ├─e7bf7b34112bc186a6d2cfb43f68d801d1493bd14b0428054a149d4135100a05 │ │ └─20601 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─6bde919ffc064549571cd1f90fbb6340ff8e438e5af6063df94adc7b6d90884e │ │ └─33481 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─1559a5781f5cd42bfe3400baefb65d0fa7c2a729840be2c4909d15bba4ee43fe │ │ └─5195 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─b53661e5b5d7054ec70324347238b32352c410bf64b76fd34b212ae7b8990978 │ │ ├─18069 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─19785 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─7240c21bdbb74c8417d6507be115678fe096b56098edccff8110934f3c7e5acf │ │ └─4811 /pause │ ├─1c90e2c2224809dfa3a4b40abec97f7c661f7f17c816f0c7007ed672a9dc1e44 │ │ └─16624 /pause │ ├─90e08f4c718a68ee04a9810bdd28ef925f37125ca81932f578f5655c72389d46 │ │ └─33116 /pause │ ├─4e1bd9cc0a5035cb105a8989849cd2f47a7ee52711ac863b5016f07b6b7f03c5 │ │ └─14270 /server │ ├─79d15d9e8532ef6a6f9edd80e79f550f76ccc5515c2385b05ec0ce5aea9e35a4 │ │ └─13668 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─e8c985c03d4ce41b3b985e573fa60a598080e06cabe15f7273ee498fceb0af08 │ │ └─35188 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─127ef121e3986696d28e5ff7fccd22d4ce3561ce4520d294e2e802948617e556 │ │ └─33781 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─285de5b46f4e7df588d7bb7bbaa0b8edd0589025d999e8dac6e0fa028fc8c50b │ │ └─12771 /pause │ ├─2619f038bbed3a1bdce59a083325dbfa05b713bd22f6aa857bde82bc3bfde692 │ │ └─35169 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─b003ab84f3dcb2ec8069332d3fd1db9d1db41e222856a2cfdeaaa8885f4aa4f6 │ │ └─34659 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─930725ec0fd8278f50ef090a390409ed9bb3835812a6135606d88a251722100a │ │ ├─13982 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─13994 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─14377 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─41182 nginx: worker process │ │ ├─41183 nginx: worker process │ │ └─41184 nginx: cache manager process │ └─e58d1a6b7e619df127664ae5bd4988f6410158c1d0599fdf00ed819dbd316cb3 │ └─7824 /coredns -conf /etc/coredns/Corefile ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount