Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─615 /lib/systemd/systemd --user │ │ └─616 (sd-pam) │ ├─session-4.scope │ │ ├─1343 sshd: zuul [priv] │ │ └─1356 sshd: zuul@notty │ └─session-1.scope │ ├─ 612 sshd: zuul [priv] │ ├─ 629 sshd: zuul@notty │ ├─ 771 /usr/bin/python3 │ ├─ 1347 ssh: /home/zuul/.ansible/cp/199.204.45.223-22-zuul [mux] │ ├─37843 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-fmfnuqabevvszxcnqwmxshnzvhkxfyyg ; /usr/bin/python3'"'"' && sleep 0' │ ├─37844 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-fmfnuqabevvszxcnqwmxshnzvhkxfyyg ; /usr/bin/python3' && sleep 0 │ ├─37845 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-fmfnuqabevvszxcnqwmxshnzvhkxfyyg ; /usr/bin/python3 │ ├─37846 /bin/sh -c echo BECOME-SUCCESS-fmfnuqabevvszxcnqwmxshnzvhkxfyyg ; /usr/bin/python3 │ ├─37847 /usr/bin/python3 │ ├─37848 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37850 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2866 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4430 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f280013963cd4bff24f2c955b9f851f097dbf06af7fc2acfd303376200184e32 -address /run/containerd/containerd.sock │ │ ├─ 4456 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3eb7c4d8e260efb5ead01af3652ce44b5702d2a425dd781ac77ce33de1678717 -address /run/containerd/containerd.sock │ │ ├─ 4461 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e58ff2a6cd9789d8a61d0e7bd45a485c900ccb2fd25a60714ea79b62a7e3ce81 -address /run/containerd/containerd.sock │ │ ├─ 4480 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 445b82058adcc45b59c347ec69b57d3151f781313c92856aaa16c0467f6d43aa -address /run/containerd/containerd.sock │ │ ├─ 4510 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dc1e9c965cad3489ce88a28e44ccd7779ba1b36fae919a6b16ba39385e5a3b9d -address /run/containerd/containerd.sock │ │ ├─ 5022 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fec1ae3bccd284dcdd06420acbfdf25b7a32f4cb0a0ca48c6a00032a451cdd0e -address /run/containerd/containerd.sock │ │ ├─ 5647 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ce8d40ef15a4b61a0898c52ace29378952361a1aab54792729c6932fb11515ce -address /run/containerd/containerd.sock │ │ ├─ 5686 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c56d8546bf3a2c0e683fa3077220b9c3ae0568be841a315eb2cde907b2513e53 -address /run/containerd/containerd.sock │ │ ├─ 6856 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id effaee5b66eac86f4181ef0634eb60eefc530177e18d00bcab3acfc6ad177eb0 -address /run/containerd/containerd.sock │ │ ├─ 7204 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cff754370a20f35efa4bbd78370a290c486368dba966edd6f77a0dc684b8514b -address /run/containerd/containerd.sock │ │ ├─ 7243 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ef3acb0b2858c43f3cc505e21e67eff36286707ec399157bf246bf858b31db31 -address /run/containerd/containerd.sock │ │ ├─ 7594 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fee03edbab6b214932395ca75c91de8fba97e63adb3fc87833cb1f699fb8291c -address /run/containerd/containerd.sock │ │ ├─ 8088 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c1559b83869ffb1730c5dfeb2e913257e3d98b1ff99ff409f348250d309a6d7c -address /run/containerd/containerd.sock │ │ ├─ 8126 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bd711ff6f37752b7727bd2020bd59ec5602744267f5105cd228830c8aea99c96 -address /run/containerd/containerd.sock │ │ ├─ 8153 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 666c8a3a7d223a1777d98f1cc5cedc5302bd02e40e049762d3545026ab4ec436 -address /run/containerd/containerd.sock │ │ ├─10357 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 117df6a4c7039f07d4d4264953ae0a9f21893c4f223ede22839f4b59730314e0 -address /run/containerd/containerd.sock │ │ ├─10414 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1a13f63f4ef9361ba3cef01298466428d9058acd58ae8d5a96e8df7e90b462a2 -address /run/containerd/containerd.sock │ │ ├─11025 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7c60c926b4d2fe47d86a95fa8865a90c09059e9d73544198d06dbdf7634cb241 -address /run/containerd/containerd.sock │ │ ├─11132 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5ad5dac06546741210abb0eb9aba2188ff077129e70b8af9edc1846e8895d17f -address /run/containerd/containerd.sock │ │ ├─11441 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 84babcf8560758b5ac4b7d0cb24ab843bea6a5add4cfd485a4763d20e522d894 -address /run/containerd/containerd.sock │ │ ├─11853 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 697f276ca1d6aee838c5a7278318df1d81c531d463259ad5ec69d0071f2829ba -address /run/containerd/containerd.sock │ │ ├─12244 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1c1f7f18fa8231456e54349592c1e66ee1baa6ed71f93fe397e73a50c8041548 -address /run/containerd/containerd.sock │ │ ├─13947 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 479c6806ef369fc1a4fae1f970544f82987332fe422cf460e284d53a3b60275d -address /run/containerd/containerd.sock │ │ ├─14597 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1e49f11972c140a1603652f0912fe74a808bc2ed76cf2c82f1c6bc00cf8fdeee -address /run/containerd/containerd.sock │ │ ├─17909 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0eb07e0ebae50cb69a4cc9c74961f3d2b61cb5800fd9901c043f8db87bd47a01 -address /run/containerd/containerd.sock │ │ ├─20354 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f9ea5c732c07617b4246a3cd6a9e055b9415bec5a467a0b46028589a98d77812 -address /run/containerd/containerd.sock │ │ ├─20460 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e74c29b159418507983227ee67ee8ab1ae91607e5479704391c014fa8ffcad80 -address /run/containerd/containerd.sock │ │ ├─20498 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9f31a4becc37d5eb498cbdcb8f29a318ef986a8cda23a7e2d2e16f0dfb2e2c31 -address /run/containerd/containerd.sock │ │ ├─20541 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a28572e83204fa2fb6997dadd625ae4e8f2b919503bce9225eb5307ff674572c -address /run/containerd/containerd.sock │ │ ├─21532 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c62036ff75305c3cfbfcd5cdcf4401bdd55e5c72e0e7a7eea3dc363917e48950 -address /run/containerd/containerd.sock │ │ ├─21650 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f79245c7367c1a03a920eb7da7555831ef316222f4a53649bff0b74246965f30 -address /run/containerd/containerd.sock │ │ ├─22599 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d01d181ea558499d598eaeeaea37c1c403ede7a3c2740c26a24a1fd243e52910 -address /run/containerd/containerd.sock │ │ ├─23977 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 95e8977dcf068b982f3e290c319c1ff3fa948e9875ce2275ea1899ad4f7556ca -address /run/containerd/containerd.sock │ │ ├─29363 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c127915b4980b5f6968cf0476990f70eeddc3adb84a1be4d1cc75e203a109ef6 -address /run/containerd/containerd.sock │ │ ├─29401 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0588b8577a495c11aa6bc5b0bef0089cce21bdb9f7a253f718381670f7876b25 -address /run/containerd/containerd.sock │ │ └─29484 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 85be95d6e84c5a26a4944294b6d0f508a96747ab90e6093c297ca254247ffcf1 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1092 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─436 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─541 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─557 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─532 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4860 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.223 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─295 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─558 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1278 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─331 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─332 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─538 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─501f537bcf476da08958f556c18bcdc6143a0af665786f793d667d036f1d018a │ │ └─4729 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─effaee5b66eac86f4181ef0634eb60eefc530177e18d00bcab3acfc6ad177eb0 │ │ └─6881 /pause │ ├─19005665991fcdaaa3b99aa7e840a3090f524b256480a99c280b0f1a1bd0b2df │ │ ├─30826 apache2 -DFOREGROUND │ │ ├─32882 (wsgi:h -DFOREGROUND │ │ ├─32883 (wsgi:h -DFOREGROUND │ │ ├─32884 (wsgi:h -DFOREGROUND │ │ ├─32885 (wsgi:h -DFOREGROUND │ │ ├─32886 (wsgi:h -DFOREGROUND │ │ ├─32887 apache2 -DFOREGROUND │ │ └─32889 apache2 -DFOREGROUND │ ├─7c60c926b4d2fe47d86a95fa8865a90c09059e9d73544198d06dbdf7634cb241 │ │ └─11050 /pause │ ├─01454291c087e48c87c159cb6430d44a77dd8831b644dd1bbde82ac0daed6fde │ │ └─12631 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─62686a4ddb43ce621d821015a38a29883055e51f0128cfbeb06ee10581f0fd01 │ │ └─21935 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─0a1405835f4cee8feaa50c3bdec125e49295680283ed55e976a3b7ed4718379a │ │ ├─12412 mysqld --wsrep_start_position=83315e8e-3ad6-11f1-9206-b65c6b836f54:20 │ │ └─12539 /var/lib/mysql/mysql-state-monitor │ ├─1a13f63f4ef9361ba3cef01298466428d9058acd58ae8d5a96e8df7e90b462a2 │ │ └─10436 /pause │ ├─c1e244af98798ba1c8451692217d6be6a5436e983a26c8a6c815b0c2e2904aa5 │ │ ├─30848 apache2 -DFOREGROUND │ │ ├─32867 (wsgi:h -DFOREGROUND │ │ ├─32868 (wsgi:h -DFOREGROUND │ │ ├─32869 (wsgi:h -DFOREGROUND │ │ ├─32870 (wsgi:h -DFOREGROUND │ │ ├─32871 (wsgi:h -DFOREGROUND │ │ ├─32872 apache2 -DFOREGROUND │ │ └─32873 apache2 -DFOREGROUND │ ├─59d68039c2d7188874a4fd952cbfe85205b33be39d6817992388c6c7c54454cb │ │ └─7751 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─1ce5d9a02dc3e0e63b2c8e30e31e71ab5d4dbfeaed5a556bf6dbcca9b9b0d508 │ │ └─22782 /bin/oauth2-proxy │ ├─eb04d426cf058196e9958fba87ab27b86de2fe7a75a0a99672fb689488abfb82 │ │ └─22671 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-223.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─0eb07e0ebae50cb69a4cc9c74961f3d2b61cb5800fd9901c043f8db87bd47a01 │ │ └─17933 /pause │ ├─84babcf8560758b5ac4b7d0cb24ab843bea6a5add4cfd485a4763d20e522d894 │ │ └─11464 /pause │ ├─d01d181ea558499d598eaeeaea37c1c403ede7a3c2740c26a24a1fd243e52910 │ │ └─22623 /pause │ ├─b411cc362dd78f3e01af1816abe0bdb680bd7885229e67589156b8cf324fee5e │ │ └─14342 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─c56d8546bf3a2c0e683fa3077220b9c3ae0568be841a315eb2cde907b2513e53 │ │ └─5714 /pause │ ├─c127915b4980b5f6968cf0476990f70eeddc3adb84a1be4d1cc75e203a109ef6 │ │ └─29399 /pause │ ├─85be95d6e84c5a26a4944294b6d0f508a96747ab90e6093c297ca254247ffcf1 │ │ └─29521 /pause │ ├─7f7a9e87b1ca0bb5cbf7a3a796f5ca6fed4f47c1dd41c9fc00011eb77340df9b │ │ ├─26156 apache2 -DFOREGROUND │ │ ├─26186 (wsgi:k -DFOREGROUND │ │ ├─26187 (wsgi:k -DFOREGROUND │ │ ├─26188 (wsgi:k -DFOREGROUND │ │ ├─26189 (wsgi:k -DFOREGROUND │ │ ├─26191 apache2 -DFOREGROUND │ │ ├─26193 apache2 -DFOREGROUND │ │ ├─26194 apache2 -DFOREGROUND │ │ ├─26197 apache2 -DFOREGROUND │ │ ├─26198 apache2 -DFOREGROUND │ │ ├─26199 apache2 -DFOREGROUND │ │ ├─26202 apache2 -DFOREGROUND │ │ ├─26203 apache2 -DFOREGROUND │ │ ├─26204 apache2 -DFOREGROUND │ │ └─26205 apache2 -DFOREGROUND │ ├─45565705159df72c60619aff0801f9949938df200f5dc097dda5be2c6ae55385 │ │ └─21583 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─c62036ff75305c3cfbfcd5cdcf4401bdd55e5c72e0e7a7eea3dc363917e48950 │ │ └─21555 /pause │ ├─cab646ebacff53adb55dc4dacdf0f8d70959d4e8c98545ee9cfd011203969c0e │ │ └─22980 /bin/oauth2-proxy │ ├─554c68803a77a8cac04dc0ca4fa1443c054557c603a9ffa4bfdd5beacc184702 │ │ └─5918 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─9f4edd9bd51a98806fcd5399f2ca55dc9db527a41387e672858ddd195cd60757 │ │ └─4682 kube-apiserver --advertise-address=199.204.45.223 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─82a4fe19e504c8a7f5eadc07f1af11c70a82b0cc3c2e3b74ea6ec0eb18311797 │ │ └─7299 /coredns -conf /etc/coredns/Corefile │ ├─f79245c7367c1a03a920eb7da7555831ef316222f4a53649bff0b74246965f30 │ │ └─21675 /pause │ ├─f280013963cd4bff24f2c955b9f851f097dbf06af7fc2acfd303376200184e32 │ │ └─4539 /pause │ ├─697f276ca1d6aee838c5a7278318df1d81c531d463259ad5ec69d0071f2829ba │ │ └─11877 /pause │ ├─700dde833bb24cb49963c03f0814ca26bd284f2692ab6a23b0a5de0d383c8c69 │ │ └─8339 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─f5a299c99f93ca05ef9c3d950313f884c16a4cadbc8d14ba72c3d7f91d9dcabd │ │ ├─21334 python -u /app/sidecar.py │ │ ├─21595 python -u /app/sidecar.py │ │ └─21596 python -u /app/sidecar.py │ ├─cd6d10aa71a21eb6a4c20d4e999dc4a5c732fa8abbd769cd2bc1a9b40fa08118 │ │ └─22530 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─272ff6b46493bad1fd70a4eaa68d11360f331b5935e8ca959982d7b39437a1b0 │ │ └─11204 /manager --metrics-bind-address=:9782 │ ├─ec0ccd2747bf1177aa58e1cd0c31ef2fc5571216f499488a0c7ae6621e7e0a64 │ │ └─4815 /kube-vip manager │ ├─9f31a4becc37d5eb498cbdcb8f29a318ef986a8cda23a7e2d2e16f0dfb2e2c31 │ │ └─20526 /pause │ ├─1e49f11972c140a1603652f0912fe74a808bc2ed76cf2c82f1c6bc00cf8fdeee │ │ └─14621 /pause │ ├─fec1ae3bccd284dcdd06420acbfdf25b7a32f4cb0a0ca48c6a00032a451cdd0e │ │ └─5047 /pause │ ├─5d1c9c4ee705ac5a7dc0f19512c8091e132fc5b0cc5f65ca0269bbf5e2e998eb │ │ └─14702 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─79845373cd79792526039bf0fcc744ead9d3bc4a22ba29706cdb9ca929c08467 │ │ └─6912 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─a28572e83204fa2fb6997dadd625ae4e8f2b919503bce9225eb5307ff674572c │ │ └─20568 /pause │ ├─479c6806ef369fc1a4fae1f970544f82987332fe422cf460e284d53a3b60275d │ │ └─13971 /pause │ ├─ef3acb0b2858c43f3cc505e21e67eff36286707ec399157bf246bf858b31db31 │ │ └─7272 /pause │ ├─dbe96d4bd7e32ad582e8ca96ba16fbce35ba67aae27fa887ec35a17c756412bc │ │ └─22747 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─78864b8fff65c70861ff726a908cdcfd7d51d83fb161e54f9bee9b53a30fff5a │ │ ├─12362 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13616 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─f9ea5c732c07617b4246a3cd6a9e055b9415bec5a467a0b46028589a98d77812 │ │ └─20379 /pause │ ├─0588b8577a495c11aa6bc5b0bef0089cce21bdb9f7a253f718381670f7876b25 │ │ └─29436 /pause │ ├─4ad5e693210f4b99f3d6c00e1a35679360ffa732a21466beb3a3a2f51627e1e0 │ │ └─10676 /server │ ├─0cebb29c0de64b2060d320ff1f249d77a6af669e1885057b3bf5c521a5cd3ac2 │ │ ├─6117 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6500 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─3dbc9f13d99598ecd8c5ab70140ce693dd15803d392c5252cd21db7c57738219 │ │ ├─23082 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23099 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─23105 erl_child_setup 1048576 │ │ ├─23147 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23148 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23158 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─23230 /bin/sh -s rabbit_disk_monitor │ ├─666c8a3a7d223a1777d98f1cc5cedc5302bd02e40e049762d3545026ab4ec436 │ │ └─8194 /pause │ ├─6e1e127421cc1e5ba50a44d7b14b34a5185247e6b475f432deb541d3a65ff27f │ │ └─22927 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─d92638dce4408bb8600e00e27a6e3866724ae789e487b05643bac3379ea84d01 │ │ ├─30838 apache2 -DFOREGROUND │ │ ├─32860 (wsgi:h -DFOREGROUND │ │ ├─32861 (wsgi:h -DFOREGROUND │ │ ├─32862 (wsgi:h -DFOREGROUND │ │ ├─32863 (wsgi:h -DFOREGROUND │ │ ├─32864 (wsgi:h -DFOREGROUND │ │ ├─32865 apache2 -DFOREGROUND │ │ └─32866 apache2 -DFOREGROUND │ ├─3eb7c4d8e260efb5ead01af3652ce44b5702d2a425dd781ac77ce33de1678717 │ │ └─4557 /pause │ ├─97d36e6bbc6a6ed2ef846e1ba614c768f20f9b29d37c5024c599f67cb1500ee3 │ │ └─14383 /bin/memcached_exporter │ ├─bd711ff6f37752b7727bd2020bd59ec5602744267f5105cd228830c8aea99c96 │ │ └─8156 /pause │ ├─0787aeec6fe404410cd66e2bade5c6d84587bdb63ed9d9d67a983c95c36dd72a │ │ └─21128 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─9c8e489fd1812af20afac283f46b308d258b03a4cccf4eb3c8cf2c0b00a9edc2 │ │ ├─21358 python -u /app/sidecar.py │ │ ├─21604 python -u /app/sidecar.py │ │ └─21605 python -u /app/sidecar.py │ ├─f6cc349eea356248fd9e4df2e2e3eb44f7e1e0f8e669fa039caf622052d8e8ac │ │ └─20792 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─ce8d40ef15a4b61a0898c52ace29378952361a1aab54792729c6932fb11515ce │ │ └─5683 /pause │ ├─a986f6e0eb621336dd9390f1955650191a64069c53f993d9214d12af4fbdb733 │ │ └─12510 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─dc1e9c965cad3489ce88a28e44ccd7779ba1b36fae919a6b16ba39385e5a3b9d │ │ └─4597 /pause │ ├─fc7269442b599b250da1b0e509a77baa7dd746fc27c66c05725b0cae0c166a5c │ │ └─11303 /manager --metrics-bind-address=:8080 │ ├─dcd73fa7e97a64a9d026c13a09ecf8ee5b7076c964eb6d3f7c7b3f2cb67c8ba7 │ │ └─22497 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-223.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─fee03edbab6b214932395ca75c91de8fba97e63adb3fc87833cb1f699fb8291c │ │ └─7620 /pause │ ├─44db943c9232c8ab27e734ef52cb9b9698e7e137d915e4c97533c601544fcbfe │ │ └─5071 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─95e8977dcf068b982f3e290c319c1ff3fa948e9875ce2275ea1899ad4f7556ca │ │ └─24009 /pause │ ├─c1559b83869ffb1730c5dfeb2e913257e3d98b1ff99ff409f348250d309a6d7c │ │ └─8111 /pause │ ├─f3218206dfe64206fa7e036ed37bee3cc6d0d24fc1af831a2a699d4f47a67d36 │ │ ├─10634 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10645 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10772 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30550 nginx: worker process │ │ ├─30551 nginx: worker process │ │ └─30552 nginx: cache manager process │ ├─117df6a4c7039f07d4d4264953ae0a9f21893c4f223ede22839f4b59730314e0 │ │ └─10385 /pause │ ├─e74c29b159418507983227ee67ee8ab1ae91607e5479704391c014fa8ffcad80 │ │ └─20484 /pause │ ├─e58ff2a6cd9789d8a61d0e7bd45a485c900ccb2fd25a60714ea79b62a7e3ce81 │ │ └─4572 /pause │ ├─1c8171ead2f4175251b34dbd92f99188c944f9c98cc68a345a163dc0ece244d4 │ │ └─11659 percona-xtradb-cluster-operator │ ├─445b82058adcc45b59c347ec69b57d3151f781313c92856aaa16c0467f6d43aa │ │ └─4595 /pause │ ├─7a7cbcc5bc31ebee7f3582706a51e451f6df2d009dfa8eb53115d1a7150bba57 │ │ └─22712 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─5ad5dac06546741210abb0eb9aba2188ff077129e70b8af9edc1846e8895d17f │ │ └─11156 /pause │ ├─ba5185c963ce8eb82ac47394392d767e7fdc26e862e7a9aaac3bf1202a85e865 │ │ └─4707 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─f2e31f9530572d02c6a770fed5b8c96d84e3f6eb219b210ecaa2340e2b250e4f │ │ └─18034 /secretgen-controller │ ├─7e0520e731769d4785d957fbc04f936d6198fc3676f2109c889bccc7a4ff5304 │ │ └─4685 etcd --advertise-client-urls=https://199.204.45.223:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.223:2380 --initial-cluster=instance=https://199.204.45.223:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.223:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.223:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─1c1f7f18fa8231456e54349592c1e66ee1baa6ed71f93fe397e73a50c8041548 │ │ └─12269 /pause │ ├─32a6005809fcfd9ca4924f340622facb8198339d967bb0f0b46e81b3bba57d4d │ │ └─8380 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─d02a3cad0d9690e4966fcd5fd077175faa7dac63b76e5fda4a520caea2c58b3f │ │ └─7331 /coredns -conf /etc/coredns/Corefile │ ├─8495d423cc3bb1c4878851b333be8cb2bc710ffe929fa2e4f47ed63c935a1515 │ │ └─8301 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ └─cff754370a20f35efa4bbd78370a290c486368dba966edd6f77a0dc684b8514b │ └─7228 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount