Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-4.scope │ │ ├─1344 sshd: zuul [priv] │ │ └─1357 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 633 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1348 ssh: /home/zuul/.ansible/cp/199.204.45.157-22-zuul [mux] │ ├─17956 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-yxzmqqisrofzdvhvcpmuvueyjhnatmkl ; /usr/bin/python3'"'"' && sleep 0' │ ├─17957 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-yxzmqqisrofzdvhvcpmuvueyjhnatmkl ; /usr/bin/python3' && sleep 0 │ ├─17958 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-yxzmqqisrofzdvhvcpmuvueyjhnatmkl ; /usr/bin/python3 │ ├─17959 /bin/sh -c echo BECOME-SUCCESS-yxzmqqisrofzdvhvcpmuvueyjhnatmkl ; /usr/bin/python3 │ ├─17960 /usr/bin/python3 │ ├─17961 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─17963 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2865 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4426 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 68809d2fe86d93d17370042a626bb7e8b90faa9fedaf9337fa4a0523234462d0 -address /run/containerd/containerd.sock │ │ ├─ 4458 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 72ea9df23f71c4b59744fc4b18dea42e0153fe8eb0c3baa72f6a875d9333f74e -address /run/containerd/containerd.sock │ │ ├─ 4478 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 814ffc62cc72ea808a82556036afb4d6579ec748c8d7b0d25c1d859556908bdb -address /run/containerd/containerd.sock │ │ ├─ 4491 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 54b0c6c4c4a79d8ea4e216259da7fb526e874a9e5a440b8334b19efa786cba7c -address /run/containerd/containerd.sock │ │ ├─ 4530 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 50bdda4ad70c2d430b1a11cb363cac40bbeb56cf67471a485e5692aea4b44086 -address /run/containerd/containerd.sock │ │ ├─ 4949 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 07ef7b72162401ee40baa6a3bf47b2401f9f0ce78738518e853ea0eb2475abe6 -address /run/containerd/containerd.sock │ │ ├─ 5645 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e40901c8b57d603d6dd962e9884bf8ac8bdcf1220216e5634460d7c2794be6b3 -address /run/containerd/containerd.sock │ │ ├─ 5665 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 109b083f0490923bc3ea982bc1ffc532b67e6845d348a60d8290422e0a15d823 -address /run/containerd/containerd.sock │ │ ├─ 6874 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 77de9871f92d6274ab75fd8addebae734de732a186c50c4a33061ddb64acee6b -address /run/containerd/containerd.sock │ │ ├─ 7225 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 73effa0c8c957d1e5d98b03b7179b96329c3ab3a0113728af82db2708adf42d7 -address /run/containerd/containerd.sock │ │ ├─ 7264 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 426ef698c35d8379fbe3320facf64aa86ae587cdc4967a01dc996acfb497af54 -address /run/containerd/containerd.sock │ │ ├─ 7622 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3412ef1f6467810688aeaf3fb3fb72181696bffd315912ced6f1bf00566f57d4 -address /run/containerd/containerd.sock │ │ ├─ 8051 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 49f2a1ea43cefd336bdd355ab4ed099f19273bc30fc0f005c2d54445e408099b -address /run/containerd/containerd.sock │ │ ├─ 8093 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a1993278a21207fca6d632fc447dbb68eb153ce7ebd9703a7b155f8d810e41e6 -address /run/containerd/containerd.sock │ │ ├─ 8144 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9111c76b297133f62298346ae41e106ea11b0d813bed273110bef93c1fc97b8d -address /run/containerd/containerd.sock │ │ ├─10287 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id de2346b4005a89d93298ea75dc7e6ac44cce47d7cdfadbe6e5031a96e91151f4 -address /run/containerd/containerd.sock │ │ ├─10375 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0128279f8f936e211aa0f76e8f36edd105d88227eeee7674106dd32e5ca9d509 -address /run/containerd/containerd.sock │ │ ├─11024 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id da51cd63fe3fe68e24c947f1ba2d4f0d97ef85082acad06185879d1ab88a2297 -address /run/containerd/containerd.sock │ │ ├─11248 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6b57289208a25e5cca68ea887e08383edf5402be3ed0b1a3b5081b3016e2ba80 -address /run/containerd/containerd.sock │ │ ├─11560 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 69cd51a59a286005171574f54e872106b5574461300ef8ec4b962d9c5fec5954 -address /run/containerd/containerd.sock │ │ ├─11829 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2efcd870c5a5161da594b8e918506f5f0d17c7ed03dc5fcbc74e8a65274f3a47 -address /run/containerd/containerd.sock │ │ ├─12214 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 314dd3155d96629b41610d14077ca235b14814bde09f1a2ce6f15ab27bc5ff4d -address /run/containerd/containerd.sock │ │ ├─13776 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c988e68072cb7ac0f707a401d44032c079ca0438553a0adbf5e2fb44404d344b -address /run/containerd/containerd.sock │ │ ├─14375 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b5ca2dc2f53fde3800bd9153104d0395b551b7e971ddd52c70041a9fff7c13d5 -address /run/containerd/containerd.sock │ │ └─17780 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b2eaf191f52c100e8c6b13c4945c80eb334303e9695d8ac834dcd9d2a7bcb88f -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1094 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─439 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ ├─ 329 /lib/systemd/systemd-udevd │ │ ├─17743 /lib/systemd/systemd-udevd │ │ ├─17745 /lib/systemd/systemd-udevd │ │ ├─17750 /lib/systemd/systemd-udevd │ │ ├─17751 /lib/systemd/systemd-udevd │ │ ├─17752 /lib/systemd/systemd-udevd │ │ ├─17753 /lib/systemd/systemd-udevd │ │ ├─17754 /lib/systemd/systemd-udevd │ │ ├─17755 /lib/systemd/systemd-udevd │ │ ├─17756 /lib/systemd/systemd-udevd │ │ ├─17757 /lib/systemd/systemd-udevd │ │ ├─17758 /lib/systemd/systemd-udevd │ │ ├─17759 /lib/systemd/systemd-udevd │ │ ├─17760 /lib/systemd/systemd-udevd │ │ ├─17761 /lib/systemd/systemd-udevd │ │ ├─17762 /lib/systemd/systemd-udevd │ │ ├─17763 /lib/systemd/systemd-udevd │ │ └─17764 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─543 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─559 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─534 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4855 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.157 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─565 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1279 /usr/sbin/uuidd --socket-activation │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─540 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─b147f00db953199610c09dc68a43697d394072e2b4cf663ecc3c2761f2e2d54a │ │ └─4999 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─c3af2fd1fe5ebc601f3f40eb583d6b2d4670688125d3bf77b3d3e163c5a70081 │ │ └─7326 /coredns -conf /etc/coredns/Corefile │ ├─1dbd50ab16c1aa570195bfe41036a7414dac779d6ff419a45aebd47f0ab19e61 │ │ └─14149 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─78a8d4c23c4374ec57a79471ba00c35b707a43ba00ce4f1df1f4d8fbf2d09765 │ │ ├─12263 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─14798 haproxy -sf 134 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─3412ef1f6467810688aeaf3fb3fb72181696bffd315912ced6f1bf00566f57d4 │ │ └─7647 /pause │ ├─ddeb2cfb856ea32e7c652cc397e1f83f65054a19c6f67ae5814decad51dca79e │ │ └─8343 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─72ea9df23f71c4b59744fc4b18dea42e0153fe8eb0c3baa72f6a875d9333f74e │ │ └─4558 /pause │ ├─49f2a1ea43cefd336bdd355ab4ed099f19273bc30fc0f005c2d54445e408099b │ │ └─8076 /pause │ ├─54b0c6c4c4a79d8ea4e216259da7fb526e874a9e5a440b8334b19efa786cba7c │ │ └─4580 /pause │ ├─9c4cf78161de534e993571c5478e691247d01173fcc11adff14a750df4e9e4fc │ │ └─6928 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─3e4b3378d98a7126386da79b31325c18aaf9ca406db926175abd43876311cbe8 │ │ └─8306 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─47ab5a56901ec34b02765579777eb98e36392433734736f6e1041fbf14435694 │ │ └─12337 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─d284f68ca0a30508c9383acdb3d2f0c50042b04c2de47002963ada67d7335c27 │ │ └─4664 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─6b57289208a25e5cca68ea887e08383edf5402be3ed0b1a3b5081b3016e2ba80 │ │ └─11273 /pause │ ├─a35659f89e19095ad25f4012f4c3822e595a5441a4324b5d819fba7398a5fd78 │ │ ├─12414 mysqld --wsrep_start_position=646d3713-39f4-11f1-bb14-3ba0530a8887:20 │ │ └─12534 /var/lib/mysql/mysql-state-monitor │ ├─7d02b8f794ec34e36e012680ab549983641bf13e91dea5f125e7cbf49e0c0668 │ │ └─12510 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─f607d103c2680299d3dc2b4a12ca73f23d4e69a88191df3dae9d9a5c7b5a74bc │ │ ├─10598 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10611 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10715 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─17831 nginx: worker process │ │ ├─17832 nginx: worker process │ │ └─17833 nginx: cache manager process │ ├─2efcd870c5a5161da594b8e918506f5f0d17c7ed03dc5fcbc74e8a65274f3a47 │ │ └─11853 /pause │ ├─0128279f8f936e211aa0f76e8f36edd105d88227eeee7674106dd32e5ca9d509 │ │ └─10399 /pause │ ├─23d56ab159913353071fecce9f9bf8c0bcce2966b7d7c5f9dac54cff2683d88c │ │ └─4808 /kube-vip manager │ ├─109b083f0490923bc3ea982bc1ffc532b67e6845d348a60d8290422e0a15d823 │ │ └─5710 /pause │ ├─69cd51a59a286005171574f54e872106b5574461300ef8ec4b962d9c5fec5954 │ │ └─11586 /pause │ ├─9111c76b297133f62298346ae41e106ea11b0d813bed273110bef93c1fc97b8d │ │ └─8169 /pause │ ├─77de9871f92d6274ab75fd8addebae734de732a186c50c4a33061ddb64acee6b │ │ └─6898 /pause │ ├─e6de762af8e48e8fccca979926e28bcde5cae5501f58c6720ebe8c572fc98ade │ │ ├─6153 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6522 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─314dd3155d96629b41610d14077ca235b14814bde09f1a2ce6f15ab27bc5ff4d │ │ └─12238 /pause │ ├─9ee49b1a7928f6ecd29f0d3816b0a2e66981e8f941d3583b447d126649dda1a6 │ │ └─10644 /server │ ├─a1993278a21207fca6d632fc447dbb68eb153ce7ebd9703a7b155f8d810e41e6 │ │ └─8117 /pause │ ├─e40901c8b57d603d6dd962e9884bf8ac8bdcf1220216e5634460d7c2794be6b3 │ │ └─5696 /pause │ ├─de2346b4005a89d93298ea75dc7e6ac44cce47d7cdfadbe6e5031a96e91151f4 │ │ └─10320 /pause │ ├─b2eaf191f52c100e8c6b13c4945c80eb334303e9695d8ac834dcd9d2a7bcb88f │ │ └─17804 /pause │ ├─ded4a369d485b6d26ebf959ccf549e0a95c0ade4a06e5ca45a4648dcd5bf99d0 │ │ └─11321 /manager --metrics-bind-address=:9782 │ ├─07ef7b72162401ee40baa6a3bf47b2401f9f0ce78738518e853ea0eb2475abe6 │ │ └─4972 /pause │ ├─b5ca2dc2f53fde3800bd9153104d0395b551b7e971ddd52c70041a9fff7c13d5 │ │ └─14399 /pause │ ├─2faab9e41a4330ec0e4d7902dbe11798c9fbf6fd8a3e34dbd7fd7fbed08d319e │ │ └─14543 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─44badda97f15d2de6294f356beda2ed69aaeec0d363c5cb2e55dca119354408b │ │ └─17912 /secretgen-controller │ ├─24203f7b3c43fba66b889a2ace8741cf5b0a28e215ebfbef1fbd10fe63bec94f │ │ └─7339 /coredns -conf /etc/coredns/Corefile │ ├─50bdda4ad70c2d430b1a11cb363cac40bbeb56cf67471a485e5692aea4b44086 │ │ └─4601 /pause │ ├─426ef698c35d8379fbe3320facf64aa86ae587cdc4967a01dc996acfb497af54 │ │ └─7288 /pause │ ├─da51cd63fe3fe68e24c947f1ba2d4f0d97ef85082acad06185879d1ab88a2297 │ │ └─11048 /pause │ ├─af23e5fd7f1123a950ed7ab7727c3ebb00fbfaddd5457c826b7a22eb60d099dc │ │ └─5956 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─5fd9318dddbd215020062735f5016f726a62b312685c9d3ab7039d256757e162 │ │ └─7696 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─73effa0c8c957d1e5d98b03b7179b96329c3ab3a0113728af82db2708adf42d7 │ │ └─7254 /pause │ ├─bb73b53cabbfb20e4de02b0fa655c9b6d4d3ac957f68ba0f455869c3d1193b36 │ │ └─4682 kube-apiserver --advertise-address=199.204.45.157 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─31ed8963e4c54cd599a36739d4214fa8c47193a529a6e4a7a443db633a63ccde │ │ └─4707 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─c03de29921a99d45f713db295e64d1e62081b4f10c4aa587da522f7a212b21b5 │ │ └─11707 percona-xtradb-cluster-operator │ ├─2fd91456d8ad9ea8e2eb8d1c465cec068dbd264c1765debe07c631fc96fdf1cd │ │ └─4721 etcd --advertise-client-urls=https://199.204.45.157:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.157:2380 --initial-cluster=instance=https://199.204.45.157:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.157:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.157:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─c988e68072cb7ac0f707a401d44032c079ca0438553a0adbf5e2fb44404d344b │ │ └─13801 /pause │ ├─9ee7556e6e8c172a510354b14e9f774ec9994ff7670e2baaf1c7da4b21222e72 │ │ └─11418 /manager --metrics-bind-address=:8080 │ ├─d3c049cfae0c25e8d64f9d9cbde603e8177d076ebc47796f4304d80ed7f7a309 │ │ └─14201 /bin/memcached_exporter │ ├─a64cfa9552b1563f6a3adb85bcd1f1b197b6c7358f252e7d5ed4e7a0de8782d0 │ │ └─8269 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─814ffc62cc72ea808a82556036afb4d6579ec748c8d7b0d25c1d859556908bdb │ │ └─4565 /pause │ └─68809d2fe86d93d17370042a626bb7e8b90faa9fedaf9337fa4a0523234462d0 │ └─4509 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount