Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─621 /lib/systemd/systemd --user │ │ └─622 (sd-pam) │ ├─session-4.scope │ │ ├─1354 sshd: zuul [priv] │ │ └─1367 sshd: zuul@notty │ └─session-1.scope │ ├─ 618 sshd: zuul [priv] │ ├─ 635 sshd: zuul@notty │ ├─ 772 /usr/bin/python3 │ ├─ 1358 ssh: /home/zuul/.ansible/cp/199.204.45.4-22-zuul [mux] │ ├─21783 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-lfwlmbadhjftejhumtvkexpjkgcnwlmm ; /usr/bin/python3'"'"' && sleep 0' │ ├─21784 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-lfwlmbadhjftejhumtvkexpjkgcnwlmm ; /usr/bin/python3' && sleep 0 │ ├─21785 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-lfwlmbadhjftejhumtvkexpjkgcnwlmm ; /usr/bin/python3 │ ├─21786 /bin/sh -c echo BECOME-SUCCESS-lfwlmbadhjftejhumtvkexpjkgcnwlmm ; /usr/bin/python3 │ ├─21787 /usr/bin/python3 │ ├─21788 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─21790 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2876 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4432 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7fae190000d850d1002a227d46125c3a8767977aef076899a211dc990d77c6f6 -address /run/containerd/containerd.sock │ │ ├─ 4459 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8fab8b3a86ff0b3d3a104d21728877c0d0dfc33cf23192035ffde3ca69a8a702 -address /run/containerd/containerd.sock │ │ ├─ 4475 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8c4db3223d1235c53d6a0a02f26bbb8a635e66278c00ff7f776b90bfe61ae908 -address /run/containerd/containerd.sock │ │ ├─ 4502 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7be82091cfb24390d87c7699055c6f3e7d1068a60a1160dd501b6e136a233e58 -address /run/containerd/containerd.sock │ │ ├─ 4520 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e295467f4c868a78bea1835d88cc8af9ea8d668a490695095a6cee4b1ca40802 -address /run/containerd/containerd.sock │ │ ├─ 5003 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id db8b8bb6b5d65e7e00bfd350ffc8d21d36c76d11fe39420a123c191aa4c2fefe -address /run/containerd/containerd.sock │ │ ├─ 5659 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3af49fc25c015c17160882fa03c70d4125e5f8889753be36d2863d7041c30177 -address /run/containerd/containerd.sock │ │ ├─ 5688 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 034b089c0153a79ed6114cd814244f6aaa6a72023b51e26d32702f8851192f62 -address /run/containerd/containerd.sock │ │ ├─ 6843 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6340d25d54fef750a8929ebe2f676ee21113a47a84adc2f952190a72cbae0d7d -address /run/containerd/containerd.sock │ │ ├─ 7190 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 904e0f69631ffa9dbb8fa2ee06b5429a406a27c6b9987511deab6774b47e2d51 -address /run/containerd/containerd.sock │ │ ├─ 7227 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ac808b96d20512b3944521fdfadf98d7fb52f7866fc82739fa2471104f03e380 -address /run/containerd/containerd.sock │ │ ├─ 7576 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 07f2cdca4a4dac0bd22d08e2edb7a977d1fa8766b906fbf87940a8c9235747a3 -address /run/containerd/containerd.sock │ │ ├─ 8041 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 26c6e35ebda7c4624e84f50ef2680a2a94d3f49671ca33a744d3a64dca38bee1 -address /run/containerd/containerd.sock │ │ ├─ 8087 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 68d7c1089f71c511994d8ea9663c39547acca313584e89e7250f16a5e34fe75e -address /run/containerd/containerd.sock │ │ ├─ 8124 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9704d2ddb58e9509e410636419f9f578803f4781d3743cf6e194a490d3bd600f -address /run/containerd/containerd.sock │ │ ├─ 9978 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eda7f38ffb4b40cd1b18bf7569bf252b26b6cccddb82f828cee7041c8f282cd3 -address /run/containerd/containerd.sock │ │ ├─10048 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c2e9fd27fac55dfb90efbc80ededa33f9ed4d78bb5f444dbec3f9867e778b69a -address /run/containerd/containerd.sock │ │ ├─10680 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7cb5b0b7a7569a466acb5d75d1a55c7144252426e4a4867520032504720314c0 -address /run/containerd/containerd.sock │ │ ├─10773 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fe7c3bf82ed52cc51091773a88d7d7270b2bd26fc3e1e58f3db8516f3640f6b8 -address /run/containerd/containerd.sock │ │ ├─11078 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 21c06d5b0cb746b3c62ce97d50ad5d17a87825c65bda779a1f45406137b7f98b -address /run/containerd/containerd.sock │ │ ├─11565 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b812f036c03614805e48107bc361d51fb4285be53d950efc2451659c1f813e9b -address /run/containerd/containerd.sock │ │ ├─11834 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d823a271ffee3141460e54cf31704cbb2d09c2279fcf2edf18bde933975195a1 -address /run/containerd/containerd.sock │ │ ├─13567 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 09974fa80ea13ead8ec2447d46ecc3d721b38fd1a17bd4e73f900dc81fee0a0c -address /run/containerd/containerd.sock │ │ ├─14197 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 79887e9a50727c5968b172d20b2e6fc8282c0ab88010656e7144bfd6b5c581f6 -address /run/containerd/containerd.sock │ │ ├─17741 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 50d5647726d75a1cceaedefbb39acba1ecfca99b7dfa107286f2e4f211214f45 -address /run/containerd/containerd.sock │ │ ├─20313 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 43371b9d949526b921ad3eb4f8016b8d47484c2fe9f79d8130e6b3bf255962f9 -address /run/containerd/containerd.sock │ │ ├─20442 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cb0d757c87160e721a1cea25e4d010aa7abf8b079f8c352e7d301bd33fa55736 -address /run/containerd/containerd.sock │ │ ├─20480 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id cad3f4e1f141d80c8d88d936d6b161c37748fc9ae2f9bdccba3fb8799f828175 -address /run/containerd/containerd.sock │ │ ├─20533 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 74c9745e9060581f86b6c29c50c4a244362c34b262320a270ffe9b27ecdc50e0 -address /run/containerd/containerd.sock │ │ ├─21513 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2167ef02f5c92908469744a7d1738ee1752c5567662259c91a36c0531121d83e -address /run/containerd/containerd.sock │ │ └─21703 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 766c8f85d4eca2fa6c7a54da9ee2d3ba43b569b8107d8df6da6a70851f0b9156 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1095 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─438 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ ├─ 329 /lib/systemd/systemd-udevd │ │ ├─19994 /lib/systemd/systemd-udevd │ │ ├─19996 /lib/systemd/systemd-udevd │ │ ├─19999 /lib/systemd/systemd-udevd │ │ ├─20000 /lib/systemd/systemd-udevd │ │ ├─20001 /lib/systemd/systemd-udevd │ │ ├─20002 /lib/systemd/systemd-udevd │ │ ├─20003 /lib/systemd/systemd-udevd │ │ ├─20004 /lib/systemd/systemd-udevd │ │ ├─20005 /lib/systemd/systemd-udevd │ │ ├─20006 /lib/systemd/systemd-udevd │ │ ├─20007 /lib/systemd/systemd-udevd │ │ ├─20008 /lib/systemd/systemd-udevd │ │ ├─20009 /lib/systemd/systemd-udevd │ │ ├─20010 /lib/systemd/systemd-udevd │ │ ├─20011 /lib/systemd/systemd-udevd │ │ ├─20012 /lib/systemd/systemd-udevd │ │ ├─20013 /lib/systemd/systemd-udevd │ │ ├─20402 /lib/systemd/systemd-udevd │ │ ├─20403 /lib/systemd/systemd-udevd │ │ ├─20404 /lib/systemd/systemd-udevd │ │ ├─20405 /lib/systemd/systemd-udevd │ │ ├─20406 /lib/systemd/systemd-udevd │ │ ├─20407 /lib/systemd/systemd-udevd │ │ ├─20408 /lib/systemd/systemd-udevd │ │ ├─20409 /lib/systemd/systemd-udevd │ │ ├─20410 /lib/systemd/systemd-udevd │ │ ├─20869 /lib/systemd/systemd-udevd │ │ ├─20870 /lib/systemd/systemd-udevd │ │ ├─20871 /lib/systemd/systemd-udevd │ │ ├─20872 /lib/systemd/systemd-udevd │ │ ├─20873 /lib/systemd/systemd-udevd │ │ └─20874 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─539 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─560 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─532 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4870 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.4 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─297 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─567 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1289 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─333 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─334 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─538 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─de38662ed0ae269f5ae73f1267b86d45348090f7eb12df181b6bfea874aae165 │ │ └─21562 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─3a3af65a8e40f00a2b8707e06228b2c21bdc96052edaf6a7cb7f22924f3bec7e │ │ └─7285 /coredns -conf /etc/coredns/Corefile │ ├─828b75b29a1bd75cfe36e989f363bc1e1568694f466b0180539b5414baf9536d │ │ ├─21145 python -u /app/sidecar.py │ │ ├─21415 python -u /app/sidecar.py │ │ └─21416 python -u /app/sidecar.py │ ├─db8b8bb6b5d65e7e00bfd350ffc8d21d36c76d11fe39420a123c191aa4c2fefe │ │ └─5027 /pause │ ├─c6c51e1925f3115eec3f09c3fc4f7c80e4d18ec18af2bc855a6c3cf6a3cdefa2 │ │ ├─11994 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13178 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─8c4db3223d1235c53d6a0a02f26bbb8a635e66278c00ff7f776b90bfe61ae908 │ │ └─4552 /pause │ ├─e582774a25694304d35a48d3870b594ce2389d218468d5382e31a0d2c6a42ff3 │ │ ├─21169 python -u /app/sidecar.py │ │ ├─21419 python -u /app/sidecar.py │ │ └─21420 python -u /app/sidecar.py │ ├─3af49fc25c015c17160882fa03c70d4125e5f8889753be36d2863d7041c30177 │ │ └─5697 /pause │ ├─79887e9a50727c5968b172d20b2e6fc8282c0ab88010656e7144bfd6b5c581f6 │ │ └─14221 /pause │ ├─c2e9fd27fac55dfb90efbc80ededa33f9ed4d78bb5f444dbec3f9867e778b69a │ │ └─10073 /pause │ ├─21c06d5b0cb746b3c62ce97d50ad5d17a87825c65bda779a1f45406137b7f98b │ │ └─11103 /pause │ ├─678bc541e563ff94a0e92e14e3f595fc7904adfe11b101c457ebab876822d223 │ │ ├─10295 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10308 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10416 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─20730 nginx: worker process │ │ ├─20731 nginx: worker process │ │ └─20732 nginx: cache manager process │ ├─034b089c0153a79ed6114cd814244f6aaa6a72023b51e26d32702f8851192f62 │ │ └─5731 /pause │ ├─e295467f4c868a78bea1835d88cc8af9ea8d668a490695095a6cee4b1ca40802 │ │ └─4608 /pause │ ├─766c8f85d4eca2fa6c7a54da9ee2d3ba43b569b8107d8df6da6a70851f0b9156 │ │ └─21728 /pause │ ├─c43ad0144a124d16a67e238ed4494a4e52b9c56e18369bffbb45d24a7fa30734 │ │ └─4728 etcd --advertise-client-urls=https://199.204.45.4:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.4:2380 --initial-cluster=instance=https://199.204.45.4:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.4:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.4:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─d823a271ffee3141460e54cf31704cbb2d09c2279fcf2edf18bde933975195a1 │ │ └─11858 /pause │ ├─07f2cdca4a4dac0bd22d08e2edb7a977d1fa8766b906fbf87940a8c9235747a3 │ │ └─7601 /pause │ ├─ac808b96d20512b3944521fdfadf98d7fb52f7866fc82739fa2471104f03e380 │ │ └─7254 /pause │ ├─75ed1f09ada0ff84012daa7a7d1c4ddd83af590b4ba72e055a037d0e4de1a636 │ │ └─4693 kube-apiserver --advertise-address=199.204.45.4 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─eda7f38ffb4b40cd1b18bf7569bf252b26b6cccddb82f828cee7041c8f282cd3 │ │ └─10006 /pause │ ├─2167ef02f5c92908469744a7d1738ee1752c5567662259c91a36c0531121d83e │ │ └─21537 /pause │ ├─4bf361c1de4c6f80e689c0574caa77f62228c386785d29f933bb30bef466fa94 │ │ └─20673 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─2f2071c81ae992d2540536dc45d9ed0d93287bbcf62d69d43c461f89aeb405cb │ │ └─4714 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─50d5647726d75a1cceaedefbb39acba1ecfca99b7dfa107286f2e4f211214f45 │ │ └─17764 /pause │ ├─6d10666582d77a1c28b22de7a2f4a3707958150280725d26ba890ab8cfa73ed1 │ │ └─14013 /bin/memcached_exporter │ ├─cb4fcb51f39899514a10dfd4ee2f8b7b83d681e6bca910114c586cd1708f4715 │ │ └─4692 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─f32568eda6d8e28edb0bd4ddef9b19019dcfcb80923b4b79d65da3363c77c21a │ │ └─5052 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─26c16e904559543348162ea1038e6781e475e6d15a2582b6e7f92518e1f739c6 │ │ └─11395 percona-xtradb-cluster-operator │ ├─3ee20797929a40ec17a6ca3a137c68afd0a17d44ed4ef0253963d842f0add9c8 │ │ └─21300 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─4d873fc93aeb82d61e470f6c8baab441555c706f5b92131220a29cbf6b4e8178 │ │ ├─12041 mysqld --wsrep_start_position=24710345-3220-11f1-bcfd-a69a6ce17e3b:20 │ │ └─12167 /var/lib/mysql/mysql-state-monitor │ ├─73bf24f00213cd9fbabadf5c0437f1f35e23bd6bad04cfbf2b93daf1530334ce │ │ └─6890 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─43371b9d949526b921ad3eb4f8016b8d47484c2fe9f79d8130e6b3bf255962f9 │ │ └─20337 /pause │ ├─257eb4f2820c04c80ae57085de1164b0963f2ed6ad0387f3bb008c74f1baf869 │ │ └─10370 /server │ ├─9704d2ddb58e9509e410636419f9f578803f4781d3743cf6e194a490d3bd600f │ │ └─8149 /pause │ ├─136ebe6ad143cffee49e93db78b0ccaaac6c2c50cab279c1aeebdd01da0a1d4f │ │ └─10847 /manager --metrics-bind-address=:9782 │ ├─2afb766213df202109f96d8d03f22961824752bf8d621b1ef79e21e484a52a36 │ │ └─12234 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─d8c98445c0fd0ee99258d70f88df8142d17e247c673878bb941af865f669a470 │ │ └─7724 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─a0b31d5e75b5efdda4cf6084eb4014e220f11afa0d79ae423e36f8d1d6b6320b │ │ └─17816 /secretgen-controller │ ├─7f6a9a3ee54f489cecea7c8a74f3033a60cba67d4138d4ace6ee2f1f8c99c435 │ │ └─8290 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─08f2b5d50e2387e11354b3719923d1d6b266c60b5121de6f3f23f290af3f04f0 │ │ └─4819 /kube-vip manager │ ├─cad3f4e1f141d80c8d88d936d6b161c37748fc9ae2f9bdccba3fb8799f828175 │ │ └─20503 /pause │ ├─68d7c1089f71c511994d8ea9663c39547acca313584e89e7250f16a5e34fe75e │ │ └─8111 /pause │ ├─fe7c3bf82ed52cc51091773a88d7d7270b2bd26fc3e1e58f3db8516f3640f6b8 │ │ └─10797 /pause │ ├─b812f036c03614805e48107bc361d51fb4285be53d950efc2451659c1f813e9b │ │ └─11589 /pause │ ├─6821a5fc997accc5ad04ac8026866c6c2dfe2ed7ae90c3a7ff1b8cd06dc3ce4c │ │ └─14337 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─56f134a91090688688c1920e52477c14950f3ea24cd36aca8c7c1d96acf57cd8 │ │ └─8329 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─6d5d24111bc3a5cfcccee80ab49d51cf6790a89560c12e2ad6c53bf84c13905a │ │ ├─6129 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6446 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─904e0f69631ffa9dbb8fa2ee06b5429a406a27c6b9987511deab6774b47e2d51 │ │ └─7213 /pause │ ├─cb0d757c87160e721a1cea25e4d010aa7abf8b079f8c352e7d301bd33fa55736 │ │ └─20466 /pause │ ├─7fae190000d850d1002a227d46125c3a8767977aef076899a211dc990d77c6f6 │ │ └─4526 /pause │ ├─7be82091cfb24390d87c7699055c6f3e7d1068a60a1160dd501b6e136a233e58 │ │ └─4588 /pause │ ├─663f0f5615562e0fde929e45f2f2323cf454e133364304e7d6732d331fdbde2d │ │ └─8253 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─74c9745e9060581f86b6c29c50c4a244362c34b262320a270ffe9b27ecdc50e0 │ │ └─20558 /pause │ ├─09974fa80ea13ead8ec2447d46ecc3d721b38fd1a17bd4e73f900dc81fee0a0c │ │ └─13590 /pause │ ├─6a37768d0a881ca699c7eeac1c1448fd5498b43ee603631b30e90a35ff0dcd6e │ │ └─7303 /coredns -conf /etc/coredns/Corefile │ ├─6340d25d54fef750a8929ebe2f676ee21113a47a84adc2f952190a72cbae0d7d │ │ └─6866 /pause │ ├─8fab8b3a86ff0b3d3a104d21728877c0d0dfc33cf23192035ffde3ca69a8a702 │ │ └─4556 /pause │ ├─78409e6d50f5431e1c4e2f3e11553862d1f563efade15514f2832b1579809031 │ │ └─10937 /manager --metrics-bind-address=:8080 │ ├─5d86ab97b10eaf95ba5219fc76bf74dc8eaf0b536b1345ac1bc979bd090630b3 │ │ └─12138 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─26c6e35ebda7c4624e84f50ef2680a2a94d3f49671ca33a744d3a64dca38bee1 │ │ └─8064 /pause │ ├─9b56aa5b4de5f16714767d5987d70708b205c6e6b645666162061b75cc52ca21 │ │ └─13937 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─7cb5b0b7a7569a466acb5d75d1a55c7144252426e4a4867520032504720314c0 │ │ └─10702 /pause │ └─7466ebd261c8a5039593a46868e06db8c69584671b4d290d3e17a372a1a06feb │ └─5928 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount