Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─619 /lib/systemd/systemd --user │ │ └─620 (sd-pam) │ ├─session-4.scope │ │ ├─1359 sshd: zuul [priv] │ │ └─1372 sshd: zuul@notty │ └─session-1.scope │ ├─ 616 sshd: zuul [priv] │ ├─ 634 sshd: zuul@notty │ ├─ 771 /usr/bin/python3 │ ├─ 1363 ssh: /home/zuul/.ansible/cp/199.204.45.19-22-zuul [mux] │ ├─38090 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-cilpmxzgjiggdnicjrvfxrypnmzqkjfe ; /usr/bin/python3'"'"' && sleep 0' │ ├─38091 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-cilpmxzgjiggdnicjrvfxrypnmzqkjfe ; /usr/bin/python3' && sleep 0 │ ├─38092 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-cilpmxzgjiggdnicjrvfxrypnmzqkjfe ; /usr/bin/python3 │ ├─38093 /bin/sh -c echo BECOME-SUCCESS-cilpmxzgjiggdnicjrvfxrypnmzqkjfe ; /usr/bin/python3 │ ├─38094 /usr/bin/python3 │ ├─38095 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38097 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2880 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4444 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 166da53fec5b1b4d89f99d0a5d4220a6cd96a394e7f3ff925c0b1e6bf4ec67eb -address /run/containerd/containerd.sock │ │ ├─ 4452 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b5ccb59e1c12704a33a0b3e3392295e1c7dfc563319ccf316186ea0bf563d70f -address /run/containerd/containerd.sock │ │ ├─ 4495 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dad4bc522dce3992e47bca79015491863f8a238b4aa468280bff64f8ff44ad9b -address /run/containerd/containerd.sock │ │ ├─ 4498 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9150d5c85116ffa67f2f783ca51641988f6c8e143fe068b002d73d46e8c612c5 -address /run/containerd/containerd.sock │ │ ├─ 4503 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ca1f6c677c1cb76a444ae04802dbf126f42983323cdcc5821da4365fe3d5c8ae -address /run/containerd/containerd.sock │ │ ├─ 4965 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 52903bffcfc0d954cab3e50bce05e14ffe5919478e48e571ae3fd200033fdc74 -address /run/containerd/containerd.sock │ │ ├─ 5669 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c873bb4a9605eba0fe4c688a6d129e4593d0668ecb59bfaf59f02c40ad43bc6c -address /run/containerd/containerd.sock │ │ ├─ 5686 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0310867e43c8b86fc0e73bb702ac28912508e3b20ee5c1cbd794e555bcc7657a -address /run/containerd/containerd.sock │ │ ├─ 6843 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f3fa69b32eaa0fea44ba2b2707b8fc2fa7273a19a6a9afd229415aedcc8724cb -address /run/containerd/containerd.sock │ │ ├─ 7203 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 79c5ed3c000e835bdcf526391ed352d428603a1efad3efacdf9aae08bc0063f0 -address /run/containerd/containerd.sock │ │ ├─ 7243 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dec0a5eded78b59bb5604c258863095ce6b636ae65f3f0d3e434500f3e30ea45 -address /run/containerd/containerd.sock │ │ ├─ 7591 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3c43fa466602ce18d8400fee1ce1411ae9cd7c92c8b29c988bcf0a5f5c6b6ad1 -address /run/containerd/containerd.sock │ │ ├─ 8032 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6df3fda443a1f534ca1fe0d778b2df02ffeb2a880aebec552d48b957a9978388 -address /run/containerd/containerd.sock │ │ ├─ 8057 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 150e50355e650fcb2fc195182c869caf683da4a94a941499da587c8f7a53e934 -address /run/containerd/containerd.sock │ │ ├─ 8123 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3b4dad53b6cc6814f371848b7ab8669e6702afa7c67bf3d3be68f11c3ec67ea1 -address /run/containerd/containerd.sock │ │ ├─10352 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2ccece20c80311f630c579827e2171626c483321db56afabdb93179022e32cc0 -address /run/containerd/containerd.sock │ │ ├─10456 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fc53dfad3493a375546bb7f99236484f9f21a5f578f626d175dedc954dfb1825 -address /run/containerd/containerd.sock │ │ ├─11004 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c591fb12733eba16a44cbeed9df26efa6781d11b93055b4d04c3d84f8b37cf42 -address /run/containerd/containerd.sock │ │ ├─11097 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2914ac83e901d73f03c824165d8419dc566f04767a64885ae2aa58a1e6fdb0c3 -address /run/containerd/containerd.sock │ │ ├─11403 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f34a1917761fdd300fde3b43903bca6240b992a4a57fb687389d0f3ad5873def -address /run/containerd/containerd.sock │ │ ├─11825 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1b33b0d784eff10e19b3fd5564e02621033ecf8e4c884a1a9e97c557102ac0cb -address /run/containerd/containerd.sock │ │ ├─12209 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d28cb5f8457e4e9f625695a61cccae862d3f0f25630d333fef502f159e93ba55 -address /run/containerd/containerd.sock │ │ ├─13819 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3666a0fe52dc9eecf4aa8bc43b2bef458caf95774502cddc1064b967c8ef5f9f -address /run/containerd/containerd.sock │ │ ├─14359 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5491b8f0195d2ec7b5ad6e8ff0ff667ae06d1050e199c50c622bc5fa9d12935e -address /run/containerd/containerd.sock │ │ ├─17841 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bcbd40d2b5cde8e5de086a420bbc39908ee35a298065478c404d55c1ae1fddfb -address /run/containerd/containerd.sock │ │ ├─20337 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5571daf95eb3a916a3c3cea5f41f250d67164b9e8977f3c1ca825293e8b9b90c -address /run/containerd/containerd.sock │ │ ├─20469 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d5be698bdc604d1cf58cfc936a8ea8e245682f7a262b64042c607d45f83cac36 -address /run/containerd/containerd.sock │ │ ├─20499 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4716d3355a2fdb78a2cf4effe4e1c7f6241c74ea075daa870f21407897fba57b -address /run/containerd/containerd.sock │ │ ├─20553 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 97c8cb85624d4f86374df7b565aee2e901618d2530ebd459f34392d1ed003b16 -address /run/containerd/containerd.sock │ │ ├─21691 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 296d91d362d0969e35a06c33f30a1348531c078a0ea7d951945e857c9ef21764 -address /run/containerd/containerd.sock │ │ ├─21776 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b8c412876f9bfe541a833cc4179ebfd586ce1cbc50645c67ada105c5241fb83 -address /run/containerd/containerd.sock │ │ ├─22562 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e731e9738c4c4e68020824ad937239be8a90ba50501d5f15c4372bcb3ab40a43 -address /run/containerd/containerd.sock │ │ ├─23830 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 94681c90f871967ecf569295918b3ed4b0057c607ed401992ac4bc5235ccbf88 -address /run/containerd/containerd.sock │ │ ├─29373 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a4e842093ed47ec14572900b8100f6a15baf531783bb75cad70692cccb26150f -address /run/containerd/containerd.sock │ │ ├─29417 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 209f13ad2f56c329cd1858f670365cbd7b0f3e65183284ff6ecf379b6bf822ea -address /run/containerd/containerd.sock │ │ └─29462 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 423aaaaea0c2b232fc614fb7b1f651424c98e42a0787eeb99587f3d243c204b7 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1095 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─327 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─558 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─532 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4874 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.19 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─systemd-journald.service │ │ └─295 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─565 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─uuidd.service │ │ └─1294 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─330 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─529 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─331 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─543 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─535 /lib/systemd/systemd-logind ├─k8s.io │ ├─1bd9f0e5066c82ae0e43037837dc63d3d6d7e0064119b91264fa12e0e766a69e │ │ └─11263 /manager --metrics-bind-address=:8080 │ ├─296d91d362d0969e35a06c33f30a1348531c078a0ea7d951945e857c9ef21764 │ │ └─21716 /pause │ ├─e731e9738c4c4e68020824ad937239be8a90ba50501d5f15c4372bcb3ab40a43 │ │ └─22585 /pause │ ├─e114db15672390928c5ff511c1ebef15fa0ad257dd740a61e3efa123429d64d4 │ │ └─4727 etcd --advertise-client-urls=https://199.204.45.19:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.19:2380 --initial-cluster=instance=https://199.204.45.19:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.19:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.19:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─d404cc497a83ef16fc23c426669ca2f2f6b0ab7945f3c46b4bdb02db804ea8fe │ │ ├─23000 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23016 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-14.2.5.1/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false │ │ ├─23022 erl_child_setup 1048576 │ │ ├─23055 sh -s disksup │ │ ├─23057 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/memsup │ │ ├─23058 /opt/erlang/lib/erlang/lib/os_mon-2.9.1/priv/bin/cpu_sup │ │ ├─23059 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─23060 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/inet_gethost 4 │ │ ├─23070 /opt/erlang/lib/erlang/erts-14.2.5.1/bin/epmd -daemon │ │ └─23176 /bin/sh -s rabbit_disk_monitor │ ├─b4d494f10b01a25a195803aa155b77902f9b5445895742c3e9abaf6f67d5a870 │ │ └─22650 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-19.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─3517dd1263fe2265848988c01082b4cbd9fea8a2b1d6920e990ad8e97c00088f │ │ └─11706 percona-xtradb-cluster-operator │ ├─3bcdee5a77a3413981ecf71e7352f7aaa93e3b1e1d6947b0f69909a2e0e0acd4 │ │ └─8263 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─6df3fda443a1f534ca1fe0d778b2df02ffeb2a880aebec552d48b957a9978388 │ │ └─8071 /pause │ ├─2eebe9a090ec3dac9d839eea6af803c8be39096a20a60b6f7b89283da03e481c │ │ └─22757 /bin/oauth2-proxy │ ├─4504e406d394f2f5a1c4b98873377637eca249b7cfa29638cef47128506f8496 │ │ └─10701 /server │ ├─ca1f6c677c1cb76a444ae04802dbf126f42983323cdcc5821da4365fe3d5c8ae │ │ └─4609 /pause │ ├─6b199c47fefda127e52c306da4e742b4355beaf605a59e53048a63809b1a9092 │ │ └─20815 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─9970503d5fdabe8634691ec107b0a68b1aac3d7340940b005409e5faf1ec55ef │ │ └─8301 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true │ ├─a4e842093ed47ec14572900b8100f6a15baf531783bb75cad70692cccb26150f │ │ └─29396 /pause │ ├─c873bb4a9605eba0fe4c688a6d129e4593d0668ecb59bfaf59f02c40ad43bc6c │ │ └─5722 /pause │ ├─eb922fca04d6656d37a812c64f50a1ddf9382c2dc3ab14e00797d1e49e27625c │ │ └─8342 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─be84dc3187d0fd9c7729547aaaa1e02a594d61635ec010036e7c7e74418824be │ │ ├─30856 apache2 -DFOREGROUND │ │ ├─33142 (wsgi:h -DFOREGROUND │ │ ├─33143 (wsgi:h -DFOREGROUND │ │ ├─33144 (wsgi:h -DFOREGROUND │ │ ├─33145 (wsgi:h -DFOREGROUND │ │ ├─33146 (wsgi:h -DFOREGROUND │ │ ├─33147 apache2 -DFOREGROUND │ │ └─33148 apache2 -DFOREGROUND │ ├─2aa50c210cd42af35572e391489164b5152a505fbe637ebf281b957f9b30c396 │ │ ├─30883 apache2 -DFOREGROUND │ │ ├─32975 (wsgi:h -DFOREGROUND │ │ ├─32976 (wsgi:h -DFOREGROUND │ │ ├─32977 (wsgi:h -DFOREGROUND │ │ ├─32978 (wsgi:h -DFOREGROUND │ │ ├─32979 (wsgi:h -DFOREGROUND │ │ ├─32980 apache2 -DFOREGROUND │ │ └─32981 apache2 -DFOREGROUND │ ├─fc53dfad3493a375546bb7f99236484f9f21a5f578f626d175dedc954dfb1825 │ │ └─10500 /pause │ ├─1b33b0d784eff10e19b3fd5564e02621033ecf8e4c884a1a9e97c557102ac0cb │ │ └─11849 /pause │ ├─42bfe6e26bc884a07d523363b86f331a384f3f22c51d6772673677152be19884 │ │ └─14517 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─209f13ad2f56c329cd1858f670365cbd7b0f3e65183284ff6ecf379b6bf822ea │ │ └─29440 /pause │ ├─7d9bfef6bf829a630256dbd4a07ac8fdf55871d1c8efc37fa3fcb5814e8efffd │ │ └─5916 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─a57e56e7eccc6c7679d5789764cb0f2ccb9c08c3540cae35652bbb4d1adf492c │ │ ├─26118 apache2 -DFOREGROUND │ │ ├─26132 (wsgi:k -DFOREGROUND │ │ ├─26133 (wsgi:k -DFOREGROUND │ │ ├─26134 (wsgi:k -DFOREGROUND │ │ ├─26135 (wsgi:k -DFOREGROUND │ │ ├─26138 apache2 -DFOREGROUND │ │ ├─26142 apache2 -DFOREGROUND │ │ ├─26143 apache2 -DFOREGROUND │ │ ├─26144 apache2 -DFOREGROUND │ │ ├─26146 apache2 -DFOREGROUND │ │ ├─26147 apache2 -DFOREGROUND │ │ ├─26148 apache2 -DFOREGROUND │ │ ├─26149 apache2 -DFOREGROUND │ │ ├─26150 apache2 -DFOREGROUND │ │ └─26151 apache2 -DFOREGROUND │ ├─79c5ed3c000e835bdcf526391ed352d428603a1efad3efacdf9aae08bc0063f0 │ │ └─7228 /pause │ ├─52903bffcfc0d954cab3e50bce05e14ffe5919478e48e571ae3fd200033fdc74 │ │ └─4990 /pause │ ├─1f455b2ba7103c4185a8211ca68fb14f316770a8dbd8472c96bdb886e6fa770d │ │ └─12508 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─a9b24e5cf3580ea3dabc2c45743deea731d0eef003954f1254baefab746fa93f │ │ └─7298 /coredns -conf /etc/coredns/Corefile │ ├─f6e333e39b4a570ce00244d6fda0c40686e20e491e5bbfda7e124ed963a2507e │ │ └─4741 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─2ccece20c80311f630c579827e2171626c483321db56afabdb93179022e32cc0 │ │ └─10381 /pause │ ├─24eb3c9dc7ffeb62c5dd814f2102aa78e03a310f6b1e93ec376640994df8b346 │ │ └─14138 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─26e5719c0921efa3d18864a3092682ecf7604ebb72fc77f682187eaec13a9b19 │ │ └─22724 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─92af4a6d899d48eec73bd3ab2b9f9c4a2c5645592131b75e849dc1e134fe92b7 │ │ └─22836 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─7f0b6902a4e34c30fe39180d9eb86c6bf4ecd878120e8d700d50f03b70c860be │ │ └─21563 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─f46330b1a66228667accf92f001ca5e46bdb0eee523347f9fa824ae8fb0d582b │ │ └─14189 /bin/memcached_exporter │ ├─97c8cb85624d4f86374df7b565aee2e901618d2530ebd459f34392d1ed003b16 │ │ └─20582 /pause │ ├─ff7dd0ee3a4c0ad9bf3def82d42afd111cd5d9e91f7803e7dbd6e6343a539aef │ │ └─22687 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─94681c90f871967ecf569295918b3ed4b0057c607ed401992ac4bc5235ccbf88 │ │ └─23855 /pause │ ├─4716d3355a2fdb78a2cf4effe4e1c7f6241c74ea075daa870f21407897fba57b │ │ └─20531 /pause │ ├─ed2eb192693853fdc1f2814b4adc149421b5b05ae247c6909348fd4ab06a3fdd │ │ └─22033 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─e7ae311efdc1778dbdf425c6a5b00db9b2aebc49a2ce96f8f96c29203f3d1f4b │ │ ├─12259 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─13432 haproxy -sf 15 -x sockpair@4 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─78bd1706525c20b5f93f8a173294362d8bc9ebb96fd07776d9d066a6ec838f4b │ │ ├─30880 apache2 -DFOREGROUND │ │ ├─33034 (wsgi:h -DFOREGROUND │ │ ├─33035 (wsgi:h -DFOREGROUND │ │ ├─33036 (wsgi:h -DFOREGROUND │ │ ├─33037 (wsgi:h -DFOREGROUND │ │ ├─33038 (wsgi:h -DFOREGROUND │ │ ├─33039 apache2 -DFOREGROUND │ │ └─33040 apache2 -DFOREGROUND │ ├─c46d59c651dc7934131f8d57cda8decf6b3eef5d1bd66ca2356afed3e9d38216 │ │ └─7327 /coredns -conf /etc/coredns/Corefile │ ├─3a2dfe6c7d5bdd05b5956d7b8a809071d786a9cb051a8c0331b894cc52003dde │ │ └─12331 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─56eab12647650b236f424de16d31e7dd1e19de71dbde3e4daeabe537e76b8bd0 │ │ └─5015 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─4cc60e91bb6f11f2109d31bd781e23cd8ce67d1ffe5bdfe845f84cdf3144eefe │ │ └─22945 /bin/oauth2-proxy │ ├─7b8c412876f9bfe541a833cc4179ebfd586ce1cbc50645c67ada105c5241fb83 │ │ └─21799 /pause │ ├─8a1965f3dd13ed52a7b96647a25defe3afb91f33ca50e7399baa73fb606bdf4d │ │ ├─21338 python -u /app/sidecar.py │ │ ├─21587 python -u /app/sidecar.py │ │ └─21588 python -u /app/sidecar.py │ ├─166da53fec5b1b4d89f99d0a5d4220a6cd96a394e7f3ff925c0b1e6bf4ec67eb │ │ └─4538 /pause │ ├─150e50355e650fcb2fc195182c869caf683da4a94a941499da587c8f7a53e934 │ │ └─8095 /pause │ ├─c591fb12733eba16a44cbeed9df26efa6781d11b93055b4d04c3d84f8b37cf42 │ │ └─11029 /pause │ ├─d5be698bdc604d1cf58cfc936a8ea8e245682f7a262b64042c607d45f83cac36 │ │ └─20502 /pause │ ├─3666a0fe52dc9eecf4aa8bc43b2bef458caf95774502cddc1064b967c8ef5f9f │ │ └─13846 /pause │ ├─986e346cc3c78f9d45a0f4979ec0069651464281af03271c2714403aee1a7bb3 │ │ └─4826 /kube-vip manager │ ├─94185c6e7ba1063bfe017e4c59cd8e7ac1610bc9e44311e8c581596c4d6b1f12 │ │ ├─12410 mysqld --wsrep_start_position=59bf9d41-37c4-11f1-83ab-a38de16a1d9f:20 │ │ └─12532 /var/lib/mysql/mysql-state-monitor │ ├─31f0b5d660ff01cb202541c656cea9c326ebf55417c51af4b5037ba3e56fb436 │ │ └─22439 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─f3fa69b32eaa0fea44ba2b2707b8fc2fa7273a19a6a9afd229415aedcc8724cb │ │ └─6867 /pause │ ├─478e580b1455bd752d85b169055b656033711ff5f8a3e52c2535c9779cf70999 │ │ └─4720 kube-apiserver --advertise-address=199.204.45.19 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─362850b9dff47e2abfe59289ead16a1c4394efbc923fc87fdc35cdd5eee1794b │ │ └─20955 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─5491b8f0195d2ec7b5ad6e8ff0ff667ae06d1050e199c50c622bc5fa9d12935e │ │ └─14383 /pause │ ├─dad4bc522dce3992e47bca79015491863f8a238b4aa468280bff64f8ff44ad9b │ │ └─4605 /pause │ ├─b5ccb59e1c12704a33a0b3e3392295e1c7dfc563319ccf316186ea0bf563d70f │ │ └─4560 /pause │ ├─3c43fa466602ce18d8400fee1ce1411ae9cd7c92c8b29c988bcf0a5f5c6b6ad1 │ │ └─7614 /pause │ ├─2914ac83e901d73f03c824165d8419dc566f04767a64885ae2aa58a1e6fdb0c3 │ │ └─11120 /pause │ ├─a51629bb4d71df5aa04414e88da106b13a04c8a55adf7a51dd3df709b3b2fb74 │ │ └─6893 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─d28cb5f8457e4e9f625695a61cccae862d3f0f25630d333fef502f159e93ba55 │ │ └─12232 /pause │ ├─8775f917825feea880820dfe6a685e335b49995c89baabab4c457e36e5c4ff18 │ │ ├─21308 python -u /app/sidecar.py │ │ ├─21585 python -u /app/sidecar.py │ │ └─21586 python -u /app/sidecar.py │ ├─423aaaaea0c2b232fc614fb7b1f651424c98e42a0787eeb99587f3d243c204b7 │ │ └─29510 /pause │ ├─9aded15064df281b0c3b8ee52a971cc96e8854fc2e8b6e33e69ce6686b61dfd2 │ │ └─17972 /secretgen-controller │ ├─104cefbab264631fb57d0f2e43a807c8e135e41450190f27841c89ec7050c38e │ │ └─7732 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─0310867e43c8b86fc0e73bb702ac28912508e3b20ee5c1cbd794e555bcc7657a │ │ └─5731 /pause │ ├─3edf5b59dc5959d40509c374d707a6f347cfae790296ed1ea297644a325fb7a3 │ │ └─4684 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─5571daf95eb3a916a3c3cea5f41f250d67164b9e8977f3c1ca825293e8b9b90c │ │ └─20389 /pause │ ├─b12a926447ab7a4f1d3491f70cfac1c7d8b80b4f5ec7e852727292e0dbc24cd3 │ │ └─22402 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-19.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─a12c8e0042f831f56577ce1831235e85e09f8078f7f19a8e5b5d6387c72a072f │ │ └─11167 /manager --metrics-bind-address=:9782 │ ├─f34a1917761fdd300fde3b43903bca6240b992a4a57fb687389d0f3ad5873def │ │ └─11426 /pause │ ├─bcbd40d2b5cde8e5de086a420bbc39908ee35a298065478c404d55c1ae1fddfb │ │ └─17866 /pause │ ├─9150d5c85116ffa67f2f783ca51641988f6c8e143fe068b002d73d46e8c612c5 │ │ └─4598 /pause │ ├─dec0a5eded78b59bb5604c258863095ce6b636ae65f3f0d3e434500f3e30ea45 │ │ └─7267 /pause │ ├─3b4dad53b6cc6814f371848b7ab8669e6702afa7c67bf3d3be68f11c3ec67ea1 │ │ └─8148 /pause │ ├─9e2e1364415f40d1857afa217d4e2450a0a28bcf82293f9fed866db12b8f6b89 │ │ ├─10636 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10651 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─10752 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─30489 nginx: worker process │ │ ├─30490 nginx: worker process │ │ └─30491 nginx: cache manager process │ └─e937576dbc5b998187a1e2b4e4044453623243bcf695fb3d9407491c1b2ed2b1 │ ├─6139 cilium-agent --config-dir=/tmp/cilium/config-map │ └─6472 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount