Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─615 /lib/systemd/systemd --user │ │ └─616 (sd-pam) │ ├─session-4.scope │ │ ├─1350 sshd: zuul [priv] │ │ └─1363 sshd: zuul@notty │ └─session-1.scope │ ├─ 612 sshd: zuul [priv] │ ├─ 630 sshd: zuul@notty │ ├─ 770 /usr/bin/python3 │ ├─ 1354 ssh: /home/zuul/.ansible/cp/199.204.45.65-22-zuul [mux] │ ├─37588 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-bqpilcecmyegqdohhcysydnkajanmvyl ; /usr/bin/python3'"'"' && sleep 0' │ ├─37589 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-bqpilcecmyegqdohhcysydnkajanmvyl ; /usr/bin/python3' && sleep 0 │ ├─37590 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-bqpilcecmyegqdohhcysydnkajanmvyl ; /usr/bin/python3 │ ├─37591 /bin/sh -c echo BECOME-SUCCESS-bqpilcecmyegqdohhcysydnkajanmvyl ; /usr/bin/python3 │ ├─37592 /usr/bin/python3 │ ├─37593 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─37595 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2871 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4436 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 52e881869126f9e15e2b6237036c29bedc11b0bc6101fbe064d45d7e30ebfcd6 -address /run/containerd/containerd.sock │ │ ├─ 4450 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fc940c48bdb119544825d5b50250160e588d9e90533d0415e039541f716dc8ee -address /run/containerd/containerd.sock │ │ ├─ 4475 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3e54dc353da717952c41bd8fd853bfb42b69308797dd4863918e1ec0a8cb2fd4 -address /run/containerd/containerd.sock │ │ ├─ 4494 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 57096fd70148fbbb2a235798c6431c918e849f5576d1d9837ba84d20bffb87b3 -address /run/containerd/containerd.sock │ │ ├─ 4515 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ecdad210e70f3d77f895640e11ba615b856ed3c157a3e1236774379b96667428 -address /run/containerd/containerd.sock │ │ ├─ 4999 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f0ce5107bc2e2b4f015d12caeb7b905a5e69075d78d33d2f0810b063c41858a7 -address /run/containerd/containerd.sock │ │ ├─ 5656 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0a01ac5d21eb923cf6cac0d76e28b34358ace62c857677df61cdb329eccf1dc0 -address /run/containerd/containerd.sock │ │ ├─ 5663 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e64747cf733a8b5f944b175c0abbbe8cc685e56330341d955f69fb5cf36506b6 -address /run/containerd/containerd.sock │ │ ├─ 6842 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e11fa1d311cb51c6f34c1b0d2134721465c1a19422cc2368f4fd5250739ca06e -address /run/containerd/containerd.sock │ │ ├─ 7182 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4b5969c3933efccf41fbf45d974aa9d5108c81c04a065febbd6d905088e4f92f -address /run/containerd/containerd.sock │ │ ├─ 7300 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0b2128fd0301cc5b1c8c3cb98335ae8304ed89682ce1038f4bf143eb0041c134 -address /run/containerd/containerd.sock │ │ ├─ 7603 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eca73be25e3803d93ceb49cd3a173c3f545cefd5e7d28d248066927ed489258e -address /run/containerd/containerd.sock │ │ ├─ 8052 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b54b700d6065eb23f7ae89ab71618c402b3f55d082362ea0c46f696f9cd44164 -address /run/containerd/containerd.sock │ │ ├─ 8098 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ecd6994e8ec3385e54e4dd02c3da36675f98b423382aaf1de2083481d91e2ea3 -address /run/containerd/containerd.sock │ │ ├─ 8131 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 34fecbf2f53e38c7d3fdf8c9277540a5ab4150d59bcc53ba1a6716fae2cb423e -address /run/containerd/containerd.sock │ │ ├─ 9977 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 79c0f852c888bd75e8d072539f9458412628c247b851eb5e56a7effd30d9c548 -address /run/containerd/containerd.sock │ │ ├─10099 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e5ca2c798cb343718b4314daed50e04d9db81dbb2461363140529e08638602d6 -address /run/containerd/containerd.sock │ │ ├─10708 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 46e2778d196c5ff21c63d3750895ba96eae5cdf589ad3a01c3e394f8ecd08b29 -address /run/containerd/containerd.sock │ │ ├─10803 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 30a81072dc715dcb4d2d0c1c36337672739a8223813d9f85dcba1afa10fee799 -address /run/containerd/containerd.sock │ │ ├─11092 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aa51f38042a8ead8a529d5832770b60c847ef151018ac2bd7011fa7630c1560a -address /run/containerd/containerd.sock │ │ ├─11577 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a350f148b82dab928f50711f4bc7b3bfc48865e51ad36fcaa7946e93438efc96 -address /run/containerd/containerd.sock │ │ ├─11854 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0d66fa09bf0a823e5beefa6d698d16a662c39d5bb725a966ccc631c6248cbf7e -address /run/containerd/containerd.sock │ │ ├─13551 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 13d66f6c81c3de7a0c702c31494486b57bb6154689812637da70aeb94ade4ffb -address /run/containerd/containerd.sock │ │ ├─14167 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e1da17a0665e16ac1fcf44a0c7c6ca5f949e9b10108ebb1233d03f3110d77e59 -address /run/containerd/containerd.sock │ │ ├─17728 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 01871b3c3f7a3840f467a0ade63e8c7f5ea554df4ad61d46298a6c7c33bf1231 -address /run/containerd/containerd.sock │ │ ├─20191 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 87353b7445edb38c69bff84579dc1d2d7c76c677025845156f93ade94360a694 -address /run/containerd/containerd.sock │ │ ├─20318 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2b8f84e335c8179c0c9989fc217d499434935c4ae896be412979fe8994d3a1d0 -address /run/containerd/containerd.sock │ │ ├─20359 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5786f9c61d8c2ada6b3821a7fc2b0f0aad8d5268121c9251923d138063b86a6d -address /run/containerd/containerd.sock │ │ ├─20402 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0a9237d3867dc6ff38aa3e40e2095c7a4a3b42f5882a5170b7db225620721ca0 -address /run/containerd/containerd.sock │ │ ├─21466 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a5463a33194367d4ebd41913b91ee65a9dcb8663a7d8e79da226f2c4ffa8ca52 -address /run/containerd/containerd.sock │ │ ├─21551 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 196a9ae82e7a6ca51d235d2f6452a6309fe6bc74c7ffd5a1575d9bba843e0bc5 -address /run/containerd/containerd.sock │ │ ├─22372 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9fc0bc92216ca4e2f10da8f40c21c0614e80f68b71f8c888046297d397b96e7f -address /run/containerd/containerd.sock │ │ ├─23576 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 41d958c650e5c5be8c495e1d997e12a17eb032d86e692ba6d7d6b91d170b78f1 -address /run/containerd/containerd.sock │ │ ├─29203 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dd689386d56f2f97ccdb79f76ae2b81ee7cd889ebca99f374914af33c789d3ed -address /run/containerd/containerd.sock │ │ ├─29421 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5bc02e49bbd4e34b09f5bc60b618a34551812c10b293e394b84ef8134124f686 -address /run/containerd/containerd.sock │ │ └─29467 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 80c20755004c590c9fa6bed0dbc54c06c125e7be28c11751227670f646d7cb66 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1091 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─438 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─328 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─543 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─557 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─533 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4867 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.65 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─296 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─558 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1285 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─dbus.service │ │ └─530 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─542 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─536 /lib/systemd/systemd-logind ├─k8s.io │ ├─eef3e49ba18a38d5297016f9286dd463b446fd71383687c66ea55dc9f1e27daf │ │ └─22508 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─2168652911d26ffc561ffa77e11ada791722bdff8633c9af07b7801ab462efd2 │ │ └─4718 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─70bee3439501388901027d1a537a165a8725bc8ddc83a35502e5d5c85e9f8d52 │ │ └─10968 /manager --metrics-bind-address=:8080 │ ├─7bcbef4a6908b23e8b5b3570ced2d481df7daa178e7c25bd3e1575dbd0a86a69 │ │ └─20646 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.34.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─fc940c48bdb119544825d5b50250160e588d9e90533d0415e039541f716dc8ee │ │ └─4562 /pause │ ├─09b6e059c352fb8e2bbc0e18c4e7358de6f9e60613a9c9898687db250548d931 │ │ └─5915 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─01871b3c3f7a3840f467a0ade63e8c7f5ea554df4ad61d46298a6c7c33bf1231 │ │ └─17751 /pause │ ├─458b288cc6ced69bbb96b6a3dc79f119b50e639bf945f06c05e477064124ecc3 │ │ └─4689 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─61bf8626f09e8d0fea21133e4c369dd53ad441aa5e0a4e465f8de58721dacee8 │ │ └─12149 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─fc0b29cc3ad8023d516cb70bf6a14c6c744fa8442a34556eaa4512d0800a7a65 │ │ └─10337 /server │ ├─e1da17a0665e16ac1fcf44a0c7c6ca5f949e9b10108ebb1233d03f3110d77e59 │ │ └─14192 /pause │ ├─29c632df366e6deb0aa79ebf84a6f03fe49b6faf32138410bef06a0b9e5abd6e │ │ ├─21055 python -u /app/sidecar.py │ │ ├─21360 python -u /app/sidecar.py │ │ └─21361 python -u /app/sidecar.py │ ├─9c979abf8eb0fcec9fc1b802a1fa1cf6a1683ab18118dfed92b16ae67c957a27 │ │ └─21812 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─41d958c650e5c5be8c495e1d997e12a17eb032d86e692ba6d7d6b91d170b78f1 │ │ └─23597 /pause │ ├─574e708a2da2479923ab6fb2989b8c2605287a345b9fe30b365eb805efea6894 │ │ └─6894 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─dfd6eba5f064059f38025e82fd523a66b434813ad6e1a44bb41bafbe097c9e99 │ │ └─7678 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─dd689386d56f2f97ccdb79f76ae2b81ee7cd889ebca99f374914af33c789d3ed │ │ └─29227 /pause │ ├─e64747cf733a8b5f944b175c0abbbe8cc685e56330341d955f69fb5cf36506b6 │ │ └─5698 /pause │ ├─08c5cceadd267e57fd8258f037a399d78db0c774c3c7d0d43b7c5087b0736e96 │ │ └─4669 kube-apiserver --advertise-address=199.204.45.65 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─fb2deb9379432ace69039cf5ac6a1ec805a15a8d6e1666f8b4811be361b3be06 │ │ └─22543 /bin/oauth2-proxy │ ├─eca73be25e3803d93ceb49cd3a173c3f545cefd5e7d28d248066927ed489258e │ │ └─7629 /pause │ ├─13c57af158abc180fe0bd488a9659cfa36d91fac676ee56582ede5aa4297314f │ │ └─14274 java -Dkc.config.built=true -Xms64m -Xmx512m -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─5bc02e49bbd4e34b09f5bc60b618a34551812c10b293e394b84ef8134124f686 │ │ └─29442 /pause │ ├─b8cfcec1960ac4bf6384d3460b11404be78e1f222f53d1c360001fdd52f99a0a │ │ └─22432 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-65.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─5ca7d62e7b2b516a9af232d955e902772b4257520395b7566fa24daec84ca0a7 │ │ └─22590 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─9fc0bc92216ca4e2f10da8f40c21c0614e80f68b71f8c888046297d397b96e7f │ │ └─22401 /pause │ ├─424de94a9994bbfaceef5dad592e96976366691eaabf40601e012fbee00a7e3b │ │ ├─22788 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─22805 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-13.2.2.6/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─22811 erl_child_setup 1048576 │ │ ├─22851 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/epmd -daemon │ │ ├─22886 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/inet_gethost 4 │ │ ├─22887 /opt/erlang/lib/erlang/erts-13.2.2.6/bin/inet_gethost 4 │ │ └─22965 /bin/sh -s rabbit_disk_monitor │ ├─196a9ae82e7a6ca51d235d2f6452a6309fe6bc74c7ffd5a1575d9bba843e0bc5 │ │ └─21576 /pause │ ├─e5ca2c798cb343718b4314daed50e04d9db81dbb2461363140529e08638602d6 │ │ └─10126 /pause │ ├─0a01ac5d21eb923cf6cac0d76e28b34358ace62c857677df61cdb329eccf1dc0 │ │ └─5710 /pause │ ├─271656cd30c926b7d8982862554c3f4515e0ddabf835629e697fd48fe9dfc94d │ │ ├─12004 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13177 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─489ac640504f52627358ee8c807745d22dfc9b2defeba6a344a67a525fab0805 │ │ └─7362 /coredns -conf /etc/coredns/Corefile │ ├─aa51f38042a8ead8a529d5832770b60c847ef151018ac2bd7011fa7630c1560a │ │ └─11116 /pause │ ├─ec4a9b958c4144d887c242019d3b64e3fe903e2ade7becb28335c8fcc0083628 │ │ └─22268 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─5786f9c61d8c2ada6b3821a7fc2b0f0aad8d5268121c9251923d138063b86a6d │ │ └─20388 /pause │ ├─0173542613e870b0e642760f4b6feda6408cc87af266ff50b8f284c468ecde20 │ │ └─8344 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─79c0f852c888bd75e8d072539f9458412628c247b851eb5e56a7effd30d9c548 │ │ └─10019 /pause │ ├─f7de37d55a2560ae58d80665cd55d60c1089d0838b41fad6bb3c4e0087183718 │ │ └─22468 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─57096fd70148fbbb2a235798c6431c918e849f5576d1d9837ba84d20bffb87b3 │ │ └─4602 /pause │ ├─b7c59bb6c67f6452024899ef4300b89d168af2b505698c464576f56af92c964b │ │ └─17801 /secretgen-controller │ ├─f2abfd905a27e67c912c339acaeec59ce117c27af95be1bfd70b300c95b88e15 │ │ └─21401 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─cda78be8e5fc1c0fe23b62571d2d607cb1380b3d6e898186f0f9dae13af1924b │ │ └─8307 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─e11fa1d311cb51c6f34c1b0d2134721465c1a19422cc2368f4fd5250739ca06e │ │ └─6866 /pause │ ├─a5463a33194367d4ebd41913b91ee65a9dcb8663a7d8e79da226f2c4ffa8ca52 │ │ └─21493 /pause │ ├─fef7e2905aa248ddeea8920b2ab87f3afb79dd4f20be3ebaf4e2a52f96a44489 │ │ ├─10301 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10313 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10443 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30415 nginx: worker process │ │ ├─30416 nginx: worker process │ │ └─30417 nginx: cache manager process │ ├─a350f148b82dab928f50711f4bc7b3bfc48865e51ad36fcaa7946e93438efc96 │ │ └─11602 /pause │ ├─bf11dca3c82cb8431db451f226164687fb04c38bc71ff2fba89d02a22498fcd3 │ │ ├─30556 apache2 -DFOREGROUND │ │ ├─33067 (wsgi:h -DFOREGROUND │ │ ├─33068 (wsgi:h -DFOREGROUND │ │ ├─33069 (wsgi:h -DFOREGROUND │ │ ├─33070 (wsgi:h -DFOREGROUND │ │ ├─33071 (wsgi:h -DFOREGROUND │ │ ├─33072 apache2 -DFOREGROUND │ │ └─33073 apache2 -DFOREGROUND │ ├─30a81072dc715dcb4d2d0c1c36337672739a8223813d9f85dcba1afa10fee799 │ │ └─10828 /pause │ ├─746d145ce70b3070e8edbeb465e0c50f1c296b9897d5a94e968b38ba2a1b92b9 │ │ └─11403 percona-xtradb-cluster-operator │ ├─c21e46aa6f8b99862c439143bee317d013adfd871277770a4c96d77f79f32034 │ │ ├─6117 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─6480 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─c0ead604e5ceb8871b5c9a77955a2da3bd0aa11b0d04df074e061af5556ddab8 │ │ └─22729 /bin/oauth2-proxy │ ├─c0126e272397e667e853cfa00208cb6f974d496eb5f813685e66c41f28077659 │ │ └─21142 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─52e881869126f9e15e2b6237036c29bedc11b0bc6101fbe064d45d7e30ebfcd6 │ │ └─4511 /pause │ ├─34fecbf2f53e38c7d3fdf8c9277540a5ab4150d59bcc53ba1a6716fae2cb423e │ │ └─8162 /pause │ ├─682fcaf32c85a9699cb45b7169542ca2432616d88a537ce5c6f541d06cac4ead │ │ └─5057 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─a652d5b71ee170a80cf1b9aa2ae910e6440b53dd29290d4c1e46a988fb4bb365 │ │ └─22223 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-65.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─0d66fa09bf0a823e5beefa6d698d16a662c39d5bb725a966ccc631c6248cbf7e │ │ └─11879 /pause │ ├─80d9184cb6a59c2b551528cadc2c8fe45db362f2905e46556657eca83290d76d │ │ ├─21082 python -u /app/sidecar.py │ │ ├─21362 python -u /app/sidecar.py │ │ └─21363 python -u /app/sidecar.py │ ├─c22fa89893f299697e187ce9c7d189821d8be8077764154b55f14c4181c47763 │ │ └─14010 /bin/memcached_exporter │ ├─7a75571b952f1df2cd15e4ef18014d2ae3cff2bd0f1ce824cacca0016706294d │ │ ├─26018 apache2 -DFOREGROUND │ │ ├─26057 (wsgi:k -DFOREGROUND │ │ ├─26058 (wsgi:k -DFOREGROUND │ │ ├─26059 (wsgi:k -DFOREGROUND │ │ ├─26060 (wsgi:k -DFOREGROUND │ │ ├─26063 apache2 -DFOREGROUND │ │ ├─26067 apache2 -DFOREGROUND │ │ ├─26068 apache2 -DFOREGROUND │ │ ├─26069 apache2 -DFOREGROUND │ │ ├─26070 apache2 -DFOREGROUND │ │ ├─26072 apache2 -DFOREGROUND │ │ ├─26073 apache2 -DFOREGROUND │ │ ├─26074 apache2 -DFOREGROUND │ │ ├─26075 apache2 -DFOREGROUND │ │ └─26076 apache2 -DFOREGROUND │ ├─959bbf84261e6a86e4ceec209e806604069470ec9a4b2043374e4e21af9fc271 │ │ └─4728 etcd --advertise-client-urls=https://199.204.45.65:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.65:2380 --initial-cluster=instance=https://199.204.45.65:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.65:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.65:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─c2f26f4bc974f51c4860d0e274882b305535cbff17f7a2322b61408f87ccb1c7 │ │ └─13916 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─d61399c19a33d0efa8f89180a1201c8dad6f9f1668eb554824c9bc36114a54fc │ │ ├─12048 mysqld --wsrep_start_position=486b4a61-3c7c-11f1-b296-7adc3c686c74:20 │ │ └─12201 /var/lib/mysql/mysql-state-monitor │ ├─80c20755004c590c9fa6bed0dbc54c06c125e7be28c11751227670f646d7cb66 │ │ └─29491 /pause │ ├─85dc8250017c4441b7437f8215a9209e2fd7dcf089c51ba716690da69f5aae15 │ │ └─8269 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─8d585fcf105415557f68887a8fb4ffd9896c172bb9619dcddc2df3d129f920d5 │ │ └─7257 /coredns -conf /etc/coredns/Corefile │ ├─2b8f84e335c8179c0c9989fc217d499434935c4ae896be412979fe8994d3a1d0 │ │ └─20343 /pause │ ├─05eea06f17af1d6fd14d6af0b4c2fd5923eb9db9c536432f5bf7752ee6966d3e │ │ ├─30922 apache2 -DFOREGROUND │ │ ├─33160 (wsgi:h -DFOREGROUND │ │ ├─33161 (wsgi:h -DFOREGROUND │ │ ├─33162 (wsgi:h -DFOREGROUND │ │ ├─33163 (wsgi:h -DFOREGROUND │ │ ├─33164 (wsgi:h -DFOREGROUND │ │ ├─33165 apache2 -DFOREGROUND │ │ └─33166 apache2 -DFOREGROUND │ ├─13d66f6c81c3de7a0c702c31494486b57bb6154689812637da70aeb94ade4ffb │ │ └─13576 /pause │ ├─0b2128fd0301cc5b1c8c3cb98335ae8304ed89682ce1038f4bf143eb0041c134 │ │ └─7324 /pause │ ├─04ae3ad230bd63af54bcb0d8a74587506cf2247b3d84d298b1b8d84dee2d8216 │ │ └─10874 /manager --metrics-bind-address=:9782 │ ├─4b5969c3933efccf41fbf45d974aa9d5108c81c04a065febbd6d905088e4f92f │ │ └─7206 /pause │ ├─ecd6994e8ec3385e54e4dd02c3da36675f98b423382aaf1de2083481d91e2ea3 │ │ └─8129 /pause │ ├─0a9237d3867dc6ff38aa3e40e2095c7a4a3b42f5882a5170b7db225620721ca0 │ │ └─20427 /pause │ ├─ecdad210e70f3d77f895640e11ba615b856ed3c157a3e1236774379b96667428 │ │ └─4596 /pause │ ├─f0ce5107bc2e2b4f015d12caeb7b905a5e69075d78d33d2f0810b063c41858a7 │ │ └─5023 /pause │ ├─b54b700d6065eb23f7ae89ab71618c402b3f55d082362ea0c46f696f9cd44164 │ │ └─8075 /pause │ ├─da0dbd2d506434e49a2af25d8e481b4e013d63e98b1f2b6b660c1e65b0066f57 │ │ └─12115 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc │ ├─672a2c33a9a1120e7752e489871231e8b71ec3fc0ba7f6c88a5f1a9cd94d616a │ │ ├─30917 apache2 -DFOREGROUND │ │ ├─33313 (wsgi:h -DFOREGROUND │ │ ├─33314 (wsgi:h -DFOREGROUND │ │ ├─33315 (wsgi:h -DFOREGROUND │ │ ├─33317 (wsgi:h -DFOREGROUND │ │ ├─33318 (wsgi:h -DFOREGROUND │ │ ├─33319 apache2 -DFOREGROUND │ │ └─33320 apache2 -DFOREGROUND │ ├─46e2778d196c5ff21c63d3750895ba96eae5cdf589ad3a01c3e394f8ecd08b29 │ │ └─10735 /pause │ ├─3e54dc353da717952c41bd8fd853bfb42b69308797dd4863918e1ec0a8cb2fd4 │ │ └─4563 /pause │ ├─f4d7e6b37c57270ab89bf24fe76cd7a4e7d5a4f23ee6fb86ec09f4b7338e6780 │ │ └─4817 /kube-vip manager │ └─87353b7445edb38c69bff84579dc1d2d7c76c677025845156f93ade94360a694 │ └─20243 /pause ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount