Control group /: -.slice ├─sys-fs-fuse-connections.mount ├─sys-kernel-config.mount ├─sys-kernel-debug.mount ├─dev-mqueue.mount ├─user.slice │ └─user-1000.slice │ ├─user@1000.service … │ │ ├─app.slice │ │ └─init.scope │ │ ├─618 /lib/systemd/systemd --user │ │ └─619 (sd-pam) │ ├─session-4.scope │ │ ├─1357 sshd: zuul [priv] │ │ └─1370 sshd: zuul@notty │ └─session-1.scope │ ├─ 615 sshd: zuul [priv] │ ├─ 632 sshd: zuul@notty │ ├─ 769 /usr/bin/python3 │ ├─ 1361 ssh: /home/zuul/.ansible/cp/199.204.45.227-22-zuul [mux] │ ├─38596 sh -c /bin/sh -c 'sudo -H -S -n -u root /bin/sh -c '"'"'echo BECOME-SUCCESS-qqgccuvicvttapqhfzsfnvleakftxpyu ; /usr/bin/python3'"'"' && sleep 0' │ ├─38597 /bin/sh -c sudo -H -S -n -u root /bin/sh -c 'echo BECOME-SUCCESS-qqgccuvicvttapqhfzsfnvleakftxpyu ; /usr/bin/python3' && sleep 0 │ ├─38598 sudo -H -S -n -u root /bin/sh -c echo BECOME-SUCCESS-qqgccuvicvttapqhfzsfnvleakftxpyu ; /usr/bin/python3 │ ├─38599 /bin/sh -c echo BECOME-SUCCESS-qqgccuvicvttapqhfzsfnvleakftxpyu ; /usr/bin/python3 │ ├─38600 /usr/bin/python3 │ ├─38601 /bin/bash -c set -x systemd-cgls --full --all --no-pager > /tmp/logs/system/systemd-cgls.txt ip addr > /tmp/logs/system/ip-addr.txt ip route > /tmp/logs/system/ip-route.txt lsblk > /tmp/logs/system/lsblk.txt mount > /tmp/logs/system/mount.txt docker images > /tmp/logs/system/docker-images.txt brctl show > /tmp/logs/system/brctl-show.txt ps aux --sort=-%mem > /tmp/logs/system/ps.txt dpkg -l > /tmp/logs/system/packages.txt CONTAINERS=($(docker ps -a --format '{{ .Names }}' --filter label=zuul)) if [ ! -z "$CONTAINERS" ]; then mkdir -p "/tmp/logs/system/containers" for CONTAINER in ${CONTAINERS}; do docker logs "${CONTAINER}" > "/tmp/logs/system/containers/${CONTAINER}.txt" done fi │ └─38603 systemd-cgls --full --all --no-pager ├─sys-kernel-tracing.mount ├─init.scope │ └─1 /lib/systemd/systemd --system --deserialize 39 nofb ├─system.slice │ ├─containerd.service … │ │ ├─ 2879 /usr/bin/containerd --config /etc/containerd/config.toml │ │ ├─ 4441 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id aa14d8d290aa19769d66b4be695da2a5046f00b92baa35ad32f9c649d4d2369b -address /run/containerd/containerd.sock │ │ ├─ 4449 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 543d10a668085fe5023aa16be493be22eda3ce05e8b97270b8342223c156912a -address /run/containerd/containerd.sock │ │ ├─ 4490 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a67e64a1bd474bfa4c2e7b3378f001257ecce5fb1ce8ff732601ede3b795291e -address /run/containerd/containerd.sock │ │ ├─ 4493 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 82aa015a382a449620ada249bcf6a08d15f721e93bf1f4268891c161d6c1d2e8 -address /run/containerd/containerd.sock │ │ ├─ 4501 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 48744c0502eff8cf35ef3441a1341bb632ae1064e4aa0777b5e73bb55d48ba48 -address /run/containerd/containerd.sock │ │ ├─ 5020 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 34a8b2a72ebbec2e357cd5931bcf4557b677648083fb5c05855bad0f0f311226 -address /run/containerd/containerd.sock │ │ ├─ 5656 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5827fc108a466e5aee9719dea4a1123f8d860bc7f5ed13c0209931ab783c113d -address /run/containerd/containerd.sock │ │ ├─ 5659 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 01fcfd8bc42f35a343ae66ff8401f77ee08d89055f3ea8ce4cd88578c555f5d0 -address /run/containerd/containerd.sock │ │ ├─ 7340 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 687e368bc40aee94eb0441bde23bb8fe35bde605015fe36c8ba8e10d5ded11c6 -address /run/containerd/containerd.sock │ │ ├─ 7683 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7a963154e9a054c7f984417e7631cb2ced0ef7671450dd9f5b5905b288045170 -address /run/containerd/containerd.sock │ │ ├─ 7738 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6f930ce1272a39e17d207779ef00395f470adbf16d55ea1342669be6ae9d5f54 -address /run/containerd/containerd.sock │ │ ├─ 8072 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2319343407f9a8565f1fb172e29efa0a562dcb53d8f3601dfe8148815f0ad3b6 -address /run/containerd/containerd.sock │ │ ├─ 8568 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ef570349963fa305a94756eb86adac60abed6fe7b79012c07edcabf5d6c8bf88 -address /run/containerd/containerd.sock │ │ ├─ 8608 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id de71779bac9a10169f4abeabe151c8e006de64c11b366ed1fc8ebc7bb03cb88f -address /run/containerd/containerd.sock │ │ ├─ 8647 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1109adf3cc486ee81af0f308bfe825a12ecb4cc95836c25ddc8a4662d2d10234 -address /run/containerd/containerd.sock │ │ ├─10833 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0288e0edf9ba8aee9ee43d99b79dbc5023a29c65b21fc0208166750f0f7e9b79 -address /run/containerd/containerd.sock │ │ ├─10920 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7d4e55e4ffc36b0f162f533020299cb902014061e5219939b39cce954bd8129d -address /run/containerd/containerd.sock │ │ ├─11577 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 9df5455314e75137244e44d8d0b21e35f0d51ca6ab65c9aef5cf5d78cb67b10a -address /run/containerd/containerd.sock │ │ ├─11605 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id acafb770bbd8fa93f3069bf658120b3f8bc7ffb4d1e206ac45c54cfcebc35ceb -address /run/containerd/containerd.sock │ │ ├─11938 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 17dbf8f762c84dfb0a184780cea6e64af3d64536f04102cf08c1a48d351f4644 -address /run/containerd/containerd.sock │ │ ├─12202 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eceab61152f1aa310b06f0a4397a95edd7d66fc94c11ea4e4d70598344f03831 -address /run/containerd/containerd.sock │ │ ├─12730 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f69b927a46fdfd8484d102ad6c08e6c87cdd17f5f27a0b6446d2c079fc1b8ed6 -address /run/containerd/containerd.sock │ │ ├─14327 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0d6a2cf7981f3f1cd69017e59ae553b3464cbfda827104fa794edf283f8d3d2c -address /run/containerd/containerd.sock │ │ ├─14901 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0ec72e790a2953ea60c8989573fb5d673b1d82b8c260d5d81fe76e34649dabd6 -address /run/containerd/containerd.sock │ │ ├─18712 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 14538e5ba1057174b67595a7d8bdc52aac9fd5da25dafc5643736b9d97c1f624 -address /run/containerd/containerd.sock │ │ ├─21195 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0673362d0b911283033373f26ebbe56ea47933da8e4b1fda0a03adf836749c1e -address /run/containerd/containerd.sock │ │ ├─21305 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4427694a5b6851cd19995a8d8d7365e44162c74e477e06783ac530e16792f3cc -address /run/containerd/containerd.sock │ │ ├─21342 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5eb6e3afcd7b89fe990f2ce064f079950e8ded47ad52b109757d1f381f153486 -address /run/containerd/containerd.sock │ │ ├─21387 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1acf08953498ef20ceb09179641a415b30abeeb9c65a365a1951f8e04e775301 -address /run/containerd/containerd.sock │ │ ├─22436 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b8425ce0c940769a96a1d593d1132b63892c8636521d825ceff781218c4711c7 -address /run/containerd/containerd.sock │ │ ├─22599 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ddc944f1deeddb56b6f2fdcbec5328d582790e1e87e04cb805f8ddd618b0be38 -address /run/containerd/containerd.sock │ │ ├─23057 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 22e14acb173a7a7e92f6d778d7383dfcf1abd8c0932cee9783f7d6b39daefc40 -address /run/containerd/containerd.sock │ │ ├─24640 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e7dc0bf81ed2d5afb584407404496c7f6b6154c82e25f30fd143ebf7e1b1bc5e -address /run/containerd/containerd.sock │ │ ├─30186 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b9475fd2a6a5edb8b6a64824075e7def1b6a0147028ec10318d16b29f46aec97 -address /run/containerd/containerd.sock │ │ ├─30241 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d0c70b46083214bb9af0adfd1facd1ffc1449db2c67a26ea4a9ad4f884205902 -address /run/containerd/containerd.sock │ │ └─30312 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5d96bbdba6ced578832d661094aeb59c48808b125825e910e7eea41959691108 -address /run/containerd/containerd.sock │ ├─packagekit.service │ │ └─1092 /usr/libexec/packagekitd │ ├─systemd-networkd.service │ │ └─437 /lib/systemd/systemd-networkd │ ├─systemd-udevd.service │ │ └─329 /lib/systemd/systemd-udevd │ ├─system-serial\x2dgetty.slice │ │ └─serial-getty@ttyS0.service │ │ └─544 /sbin/agetty -o -p -- \u --keep-baud 115200,57600,38400,9600 ttyS0 vt220 │ ├─polkit.service │ │ └─559 /usr/libexec/polkitd --no-debug │ ├─networkd-dispatcher.service │ │ └─535 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers │ ├─kubelet.service │ │ └─4827 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/config.yaml --cgroups-per-qos=false --container-runtime-endpoint=/run/containerd/containerd.sock --enforce-node-allocatable= --node-ip=199.204.45.227 --pod-infra-container-image=harbor.atmosphere.dev/registry.k8s.io/pause:3.9 │ ├─system-modprobe.slice │ ├─cloud-init-local.service │ ├─systemd-journald.service │ │ └─295 /lib/systemd/systemd-journald │ ├─ssh.service │ │ └─565 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups │ ├─cloud-final.service │ ├─uuidd.service │ │ └─1292 /usr/sbin/uuidd --socket-activation │ ├─cloud-config.service │ ├─systemd-resolved.service │ │ └─332 /lib/systemd/systemd-resolved │ ├─cloud-init.service │ ├─dbus.service │ │ └─531 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only │ ├─systemd-timesyncd.service │ │ └─333 /lib/systemd/systemd-timesyncd │ ├─system-getty.slice │ │ └─getty@tty1.service │ │ └─543 /sbin/agetty -o -p -- \u --noclear tty1 linux │ └─systemd-logind.service │ └─537 /lib/systemd/systemd-logind ├─k8s.io │ ├─fad703384477e90a35570538dfdc6932b61889e0d5049f6e5127472baf3de8e0 │ │ └─23121 grafana server --homepath=/usr/share/grafana --config=/etc/grafana/grafana.ini --packaging=docker cfg:default.log.mode=console cfg:default.paths.data=/var/lib/grafana/ cfg:default.paths.logs=/var/log/grafana cfg:default.paths.plugins=/var/lib/grafana/plugins cfg:default.paths.provisioning=/etc/grafana/provisioning │ ├─0673362d0b911283033373f26ebbe56ea47933da8e4b1fda0a03adf836749c1e │ │ └─21237 /pause │ ├─b8425ce0c940769a96a1d593d1132b63892c8636521d825ceff781218c4711c7 │ │ └─22460 /pause │ ├─ea30a02a623f97ba6e4054b3cd92ded1ac69bdea9abe57a91de240f07928d8ab │ │ ├─6618 cilium-agent --config-dir=/tmp/cilium/config-map │ │ └─7000 cilium-health-responder --listen 4240 --pidfile /var/run/cilium/state/health-endpoint.pid │ ├─b5bcc1a67d3b3e173ae6317abd104b8568904cf1977647d0648556b474656189 │ │ └─23875 /bin/oauth2-proxy │ ├─687e368bc40aee94eb0441bde23bb8fe35bde605015fe36c8ba8e10d5ded11c6 │ │ └─7361 /pause │ ├─5827fc108a466e5aee9719dea4a1123f8d860bc7f5ed13c0209931ab783c113d │ │ └─5715 /pause │ ├─8fd9483ce2db0ce799e39cd6ea784b28e038631695b2da2377197d09e0039ace │ │ └─8870 /app/cmd/cainjector/cainjector --v=2 --leader-election-namespace=cert-manager │ ├─9e4f245fe78ed62f226a1f2ffe917c07f6825f6cc2ac422dcabde52db51b2883 │ │ ├─21890 python -u /app/sidecar.py │ │ ├─22094 python -u /app/sidecar.py │ │ └─22096 python -u /app/sidecar.py │ ├─1109adf3cc486ee81af0f308bfe825a12ecb4cc95836c25ddc8a4662d2d10234 │ │ └─8672 /pause │ ├─6f930ce1272a39e17d207779ef00395f470adbf16d55ea1342669be6ae9d5f54 │ │ └─7768 /pause │ ├─e7dc0bf81ed2d5afb584407404496c7f6b6154c82e25f30fd143ebf7e1b1bc5e │ │ └─24664 /pause │ ├─dc36a413bdecca179a3c425bdfdad7df02714542cdae5c3dadc7f8935b1b31c5 │ │ └─4694 kube-apiserver --advertise-address=199.204.45.227 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-plugins=NodeRestriction --enable-bootstrap-token-auth=true --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/etc/kubernetes/pki/apiserver.crt --tls-min-version=VersionTLS13 --tls-private-key-file=/etc/kubernetes/pki/apiserver.key │ ├─9df5455314e75137244e44d8d0b21e35f0d51ca6ab65c9aef5cf5d78cb67b10a │ │ └─11617 /pause │ ├─4427694a5b6851cd19995a8d8d7365e44162c74e477e06783ac530e16792f3cc │ │ └─21328 /pause │ ├─b9a036ec80afe7515b8876853ddab0204bfba0f0d96cc6f71b7c683c4f3aa62b │ │ └─22702 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─22e14acb173a7a7e92f6d778d7383dfcf1abd8c0932cee9783f7d6b39daefc40 │ │ └─23081 /pause │ ├─eceab61152f1aa310b06f0a4397a95edd7d66fc94c11ea4e4d70598344f03831 │ │ └─12227 /pause │ ├─ef570349963fa305a94756eb86adac60abed6fe7b79012c07edcabf5d6c8bf88 │ │ └─8591 /pause │ ├─48744c0502eff8cf35ef3441a1341bb632ae1064e4aa0777b5e73bb55d48ba48 │ │ └─4598 /pause │ ├─1d468da85c736890cca926907d3b1e1925aaae06f5f7eddb0dfed6499532cb1d │ │ └─7389 /usr/local/bin/envoy-gateway server --config-path=/config/envoy-gateway.yaml │ ├─0d6a2cf7981f3f1cd69017e59ae553b3464cbfda827104fa794edf283f8d3d2c │ │ └─14350 /pause │ ├─2319343407f9a8565f1fb172e29efa0a562dcb53d8f3601dfe8148815f0ad3b6 │ │ └─8095 /pause │ ├─0ec72e790a2953ea60c8989573fb5d673b1d82b8c260d5d81fe76e34649dabd6 │ │ └─14924 /pause │ ├─3d854402bc6e6c66ac4eb1ff848c41db07bfda8a6b6269ecb0669ee16d70d169 │ │ ├─21918 python -u /app/sidecar.py │ │ ├─22148 python -u /app/sidecar.py │ │ └─22154 python -u /app/sidecar.py │ ├─0288e0edf9ba8aee9ee43d99b79dbc5023a29c65b21fc0208166750f0f7e9b79 │ │ └─10857 /pause │ ├─7d2208192d0213747251cbbc5ce5e2501d03815e12f591dd3caa7a78cf2bfd60 │ │ └─21654 /kube-state-metrics --port=8080 --telemetry-port=8081 --port=8080 --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments │ ├─a7213932424d5997793fb1b8ac5ceb45357c3186cee9f1317347e03e79e47601 │ │ └─8209 local-path-provisioner --debug start --config /etc/config/config.json --service-account-name local-path-provisioner --provisioner-name cluster.local/local-path-provisioner --helper-image harbor.atmosphere.dev/ghcr.io/containerd/busybox:1.36 --configmap-name local-path-config │ ├─13604d59c0f102a4fe97624e57094bd942af6ad7326c7214159a202be4a4aa3b │ │ └─23923 /bin/node_exporter --path.procfs=/host/proc --path.sysfs=/host/sys --path.rootfs=/host/root --path.udev.data=/host/root/run/udev/data --web.listen-address=[0.0.0.0]:9100 --collector.diskstats.ignored-devices=^(ram|loop|nbd|fd|(h|s|v|xv)d[a-z]|nvme\\d+n\\d+p)\\d+$ --collector.filesystem.fs-types-exclude=^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|fusectl|fuse.squashfuse_ll|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$ --collector.filesystem.mount-points-exclude=^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+|var/lib/kubelet/pods/.+|var/lib/kubelet/plugins/kubernetes.io/csi/.+|run/containerd/.+)($|/) --collector.netclass.ignored-devices=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.netdev.device-exclude=^(lxc|cilium_|qbr|qvb|qvo|tap|ovs-system|br|tbr|gre_sys|[0-9a-f]+_eth|vxlan).*$ --collector.processes --collector.systemd --collector.stat.softirq --web.config.file=/config/node-exporter.yml │ ├─a67e64a1bd474bfa4c2e7b3378f001257ecce5fb1ce8ff732601ede3b795291e │ │ └─4611 /pause │ ├─8e5244f195e224f7d66dea8190766f4b39b6963e2dd7845e9da03cea109a4c0e │ │ └─21943 /bin/operator --kubelet-service=kube-system/kube-prometheus-stack-kubelet --localhost=127.0.0.1 --prometheus-config-reloader=harbor.atmosphere.dev/quay.io/prometheus-operator/prometheus-config-reloader:v0.73.0 --config-reloader-cpu-request=0 --config-reloader-cpu-limit=0 --config-reloader-memory-request=0 --config-reloader-memory-limit=0 --thanos-default-base-image=quay.io/thanos/thanos:v0.35.1 --secret-field-selector=type!=kubernetes.io/dockercfg,type!=kubernetes.io/service-account-token,type!=helm.sh/release.v1 --web.enable-tls=true --web.cert-file=/cert/cert --web.key-file=/cert/key --web.listen-address=:10250 --web.tls-min-version=VersionTLS13 │ ├─1acf08953498ef20ceb09179641a415b30abeeb9c65a365a1951f8e04e775301 │ │ └─21412 /pause │ ├─5fedf77469193809c33dcbfc6a594f12afb85f3cac452b0657e575813068ce30 │ │ └─18784 /secretgen-controller │ ├─5eb6e3afcd7b89fe990f2ce064f079950e8ded47ad52b109757d1f381f153486 │ │ └─21365 /pause │ ├─aa14d8d290aa19769d66b4be695da2a5046f00b92baa35ad32f9c649d4d2369b │ │ └─4529 /pause │ ├─5abeb066d22a2844ac070ce1c1be0c0d468812ddff0acace49ceb9d84ebf001c │ │ └─7742 /coredns -conf /etc/coredns/Corefile │ ├─34a8b2a72ebbec2e357cd5931bcf4557b677648083fb5c05855bad0f0f311226 │ │ └─5044 /pause │ ├─f69b927a46fdfd8484d102ad6c08e6c87cdd17f5f27a0b6446d2c079fc1b8ed6 │ │ └─12755 /pause │ ├─0497e0cd59fe6a471c7f88464a3921d13e3313f1f0053028831a56fa4cdbf74d │ │ └─23839 /usr/bin/pod-tls-sidecar --template=/config/certificate-template.yml --ca-path=/certs/ca.crt --cert-path=/certs/tls.crt --key-path=/certs/tls.key │ ├─fc6fbe53052c2a1aaa0fe84881fa05f3a3c645430d6f1d6a8ca817ed0a92919d │ │ └─11192 /server │ ├─ddc944f1deeddb56b6f2fdcbec5328d582790e1e87e04cb805f8ddd618b0be38 │ │ └─22623 /pause │ ├─c2632eaee9f6e91ad1e5bd57142c796a8d0647214d4ae206be94331de0a26140 │ │ └─23765 /bin/prometheus --web.console.templates=/etc/prometheus/consoles --web.console.libraries=/etc/prometheus/console_libraries --config.file=/etc/prometheus/config_out/prometheus.env.yaml --web.enable-lifecycle --web.external-url=http://prometheus.199-204-45-227.nip.io/ --web.route-prefix=/ --storage.tsdb.retention.time=10d --storage.tsdb.path=/prometheus --storage.tsdb.wal-compression --web.config.file=/etc/prometheus/web_config/web-config.yaml │ ├─c132ef94c43e934e778ff4d1474a4576e131afb721145d03ab029e93770fe385 │ │ └─7811 /coredns -conf /etc/coredns/Corefile │ ├─bc849c5d2fea8310a86c2c42dd2719854ae38f10c64c8e8fe0754a44df399a78 │ │ └─23798 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9090/-/reload --config-file=/etc/prometheus/config/prometheus.yaml.gz --config-envsubst-file=/etc/prometheus/config_out/prometheus.env.yaml --watched-dir=/etc/prometheus/rules/prometheus-kube-prometheus-stack-prometheus-rulefiles-0 │ ├─7d4e55e4ffc36b0f162f533020299cb902014061e5219939b39cce954bd8129d │ │ └─10944 /pause │ ├─8d3176776a4df48eb42bc602cc8a8d010a7cc28d17aaf2e791b8c4357d9faba9 │ │ └─4964 /kube-vip manager │ ├─f9ae836d9221c5de5a242046230504f078f668e167e300784820302bc0845692 │ │ └─23546 /bin/alertmanager --config.file=/etc/alertmanager/config_out/alertmanager.env.yaml --storage.path=/alertmanager --data.retention=120h --cluster.listen-address= --web.listen-address=:9093 --web.external-url=http://alertmanager.199-204-45-227.nip.io/ --web.route-prefix=/ --cluster.label=monitoring/kube-prometheus-stack-alertmanager --cluster.peer=alertmanager-kube-prometheus-stack-alertmanager-0.alertmanager-operated:9094 --cluster.reconnect-timeout=5m --web.config.file=/etc/alertmanager/web_config/web-config.yaml │ ├─d511724b426ca41459be2a18bd06c0431c73aad5e50583f7a97ea1e4563bde4c │ │ └─15237 /bin/memcached_exporter │ ├─248ccc268af8489e97808cda5a4ac287ea2ce7716ebed35a599c546a62589fca │ │ ├─12953 mysqld --wsrep_start_position=b5e6fae7-3265-11f1-88cd-ff7027eb4a2e:20 │ │ └─13076 /var/lib/mysql/mysql-state-monitor │ ├─01fcfd8bc42f35a343ae66ff8401f77ee08d89055f3ea8ce4cd88578c555f5d0 │ │ └─5707 /pause │ ├─cb6e64f3fd7857e24b9a2b0418915ab6a2b73639e539f1703496453112146ccb │ │ └─5070 /usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=instance │ ├─605981c877b7b826296be83226363aec00aeb7f15ca87c23e080d7582a9e04cf │ │ └─4716 kube-controller-manager --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=0.0.0.0 --client-ca-file=/etc/kubernetes/pki/ca.crt --cluster-name=kubernetes --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt --cluster-signing-key-file=/etc/kubernetes/pki/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=true --requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt --root-ca-file=/etc/kubernetes/pki/ca.crt --service-account-private-key-file=/etc/kubernetes/pki/sa.key --tls-min-version=VersionTLS13 --use-service-account-credentials=true │ ├─2b572c8f915db99af3fdbbd1827d21fb1f968cd6c12781fbf0281218b157e45a │ │ └─13051 /bin/mysqld_exporter --mysqld.username=monitor --collect.info_schema.processlist │ ├─acafb770bbd8fa93f3069bf658120b3f8bc7ffb4d1e206ac45c54cfcebc35ceb │ │ └─11643 /pause │ ├─82aa015a382a449620ada249bcf6a08d15f721e93bf1f4268891c161d6c1d2e8 │ │ └─4580 /pause │ ├─6e2038c9b2719ae7c1fec2e687cd7f20a0aa39aaf243d00a86515dcac04c2a8e │ │ ├─27003 apache2 -DFOREGROUND │ │ ├─27046 (wsgi:k -DFOREGROUND │ │ ├─27047 (wsgi:k -DFOREGROUND │ │ ├─27048 (wsgi:k -DFOREGROUND │ │ ├─27049 (wsgi:k -DFOREGROUND │ │ ├─27050 apache2 -DFOREGROUND │ │ ├─27053 apache2 -DFOREGROUND │ │ ├─27056 apache2 -DFOREGROUND │ │ ├─27057 apache2 -DFOREGROUND │ │ ├─27059 apache2 -DFOREGROUND │ │ ├─27061 apache2 -DFOREGROUND │ │ ├─27062 apache2 -DFOREGROUND │ │ ├─27063 apache2 -DFOREGROUND │ │ ├─27064 apache2 -DFOREGROUND │ │ └─27065 apache2 -DFOREGROUND │ ├─f4866ca246442a498e323910771e0c21de4c7bb52a0cbe3c87890dc24f25791a │ │ ├─23476 /bin/sh /opt/rabbitmq/sbin/rabbitmq-server │ │ ├─23492 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/beam.smp -W w -MBas ageffcbf -MHas ageffcbf -MBlmbcs 512 -MHlmbcs 512 -MMmcs 30 -pc unicode -P 1048576 -t 5000000 -stbt db -zdbbl 128000 -sbwt none -sbwtdcpu none -sbwtdio none -B i -- -root /opt/erlang/lib/erlang -bindir /opt/erlang/lib/erlang/erts-15.2.7.2/bin -progname erl -- -home /var/lib/rabbitmq -- -pa -noshell -noinput -s rabbit boot -boot start_sasl -syslog logger [] -syslog syslog_error_logger false -kernel prevent_overlapping_partitions false -- │ │ ├─23498 erl_child_setup 1048576 │ │ ├─23552 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23553 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/inet_gethost 4 │ │ ├─23569 /opt/erlang/lib/erlang/erts-15.2.7.2/bin/epmd -daemon │ │ └─23663 /bin/sh -s rabbit_disk_monitor │ ├─b9475fd2a6a5edb8b6a64824075e7def1b6a0147028ec10318d16b29f46aec97 │ │ └─30212 /pause │ ├─83edface40ff1e09927ff4eb3550010369b86cc389c9ead4e2602aa3ec4e9431 │ │ └─6420 cilium-operator-generic --config-dir=/tmp/cilium/config-map --debug=false │ ├─dc37a18e35d49ab28aba64dc8e6f7a9059f69589d85f78af46a62eb6b709e90a │ │ └─14965 memcached -v -p 11211 -U 0 -c 8192 -m 1024 │ ├─7f83a861a1a36f33f5f40137ebdce7355e2dea6655c617008bfe766de11a9dd2 │ │ ├─31749 apache2 -DFOREGROUND │ │ ├─33762 (wsgi:h -DFOREGROUND │ │ ├─33763 (wsgi:h -DFOREGROUND │ │ ├─33764 (wsgi:h -DFOREGROUND │ │ ├─33765 (wsgi:h -DFOREGROUND │ │ ├─33766 (wsgi:h -DFOREGROUND │ │ ├─33767 apache2 -DFOREGROUND │ │ └─33768 apache2 -DFOREGROUND │ ├─17dbf8f762c84dfb0a184780cea6e64af3d64536f04102cf08c1a48d351f4644 │ │ └─11961 /pause │ ├─923d00a00212d0711ec6a28ae9468abc7da1fd65ab59221f615c4560490fe229 │ │ └─15054 java -Dkc.config.built=true -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Dfile.encoding=UTF-8 -Dsun.stdout.encoding=UTF-8 -Dsun.err.encoding=UTF-8 -Dstdout.encoding=UTF-8 -Dstderr.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -Djava.security.egd=file:/dev/urandom -XX:+UseParallelGC -XX:GCTimeRatio=4 -XX:AdaptiveSizePolicyWeight=90 -XX:FlightRecorderOptions=stackdepth=512 -XX:MinHeapFreeRatio=10 -XX:MaxHeapFreeRatio=20 -XX:MaxRAMPercentage=70 -XX:MinRAMPercentage=70 -XX:InitialRAMPercentage=50 --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED -Djgroups.dns.query=keycloak-headless.auth-system.svc.cluster.local -Dkc.home.dir=/opt/keycloak/bin/.. -Djboss.server.config.dir=/opt/keycloak/bin/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Dpicocli.disable.closures=true -Dquarkus-log-max-startup-records=10000 -cp /opt/keycloak/bin/../lib/quarkus-run.jar io.quarkus.bootstrap.runner.QuarkusEntryPoint --verbose start --health-enabled=true --http-enabled=true --http-port=8080 --hostname-strict=false --spi-events-listener-jboss-logging-success-level=info --spi-events-listener-jboss-logging-error-level=warn --transaction-xa-enabled=false --metrics-enabled=true │ ├─1f9916ba71dc4ae299a0fbd603cdaf76f1953fe7983f4ddd2d2252dd33d4158d │ │ └─23623 /bin/prometheus-config-reloader --listen-address=:8080 --reload-url=http://127.0.0.1:9093/-/reload --config-file=/etc/alertmanager/config/alertmanager.yaml.gz --config-envsubst-file=/etc/alertmanager/config_out/alertmanager.env.yaml --watched-dir=/etc/alertmanager/config │ ├─b6042727f678de0441efb5810081439ceb859d8c84dc487bab25b499b673b4a4 │ │ ├─12780 haproxy -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ │ └─15348 haproxy -sf 145 -x sockpair@5 -W -db -f /etc/haproxy-custom/haproxy-global.cfg -f /etc/haproxy/pxc/haproxy.cfg -p /etc/haproxy/pxc/haproxy.pid -S /etc/haproxy/pxc/haproxy-main.sock │ ├─7a963154e9a054c7f984417e7631cb2ced0ef7671450dd9f5b5905b288045170 │ │ └─7706 /pause │ ├─0cb2ba5bae6d79d57c1883a7170259deccf69d91a9271f12b97981d48d49fbe2 │ │ └─11717 /manager --metrics-bind-address=:8080 │ ├─5d96bbdba6ced578832d661094aeb59c48808b125825e910e7eea41959691108 │ │ └─30336 /pause │ ├─de71779bac9a10169f4abeabe151c8e006de64c11b366ed1fc8ebc7bb03cb88f │ │ └─8637 /pause │ ├─d7e38ed2a22a08284bc8f80dfdb5c26937231c9736aa71e5d853305c2b2c2b90 │ │ └─4673 kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=0.0.0.0 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=true --tls-min-version=VersionTLS13 │ ├─a5a41302a4978507e4cdd3005c9c75c2b829f96993c108b10973f2311a4ea3ff │ │ └─12855 /opt/percona/peer-list -on-change=/opt/percona/haproxy_add_pxc_nodes.sh -service=percona-xtradb-pxc -protocol=$(PEER_LIST_SRV_PROTOCOL) │ ├─7ddbd5f681db1d8f3d5d53bbd380c7740e6478880200a8902436a1892bc9f3a5 │ │ └─12084 percona-xtradb-cluster-operator │ ├─650f0d90c10e764742ab01c3f08804e30083940700ddc1a3dfea0784902a4b37 │ │ └─4728 etcd --advertise-client-urls=https://199.204.45.227:2379 --cert-file=/etc/kubernetes/pki/etcd/server.crt --client-cert-auth=true --data-dir=/var/lib/etcd --experimental-initial-corrupt-check=true --experimental-watch-progress-notify-interval=5s --initial-advertise-peer-urls=https://199.204.45.227:2380 --initial-cluster=instance=https://199.204.45.227:2380 --key-file=/etc/kubernetes/pki/etcd/server.key --listen-client-urls=https://127.0.0.1:2379,https://199.204.45.227:2379 --listen-metrics-urls=http://127.0.0.1:2381 --listen-peer-urls=https://199.204.45.227:2380 --name=instance --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-client-cert-auth=true --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --snapshot-count=10000 --tls-min-version=TLS1.3 --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt │ ├─543d10a668085fe5023aa16be493be22eda3ce05e8b97270b8342223c156912a │ │ └─4554 /pause │ ├─abe9b6ce9f4ec888e6746b5293e537a73f0905aaa5261a265fbb3ba56f2f69f9 │ │ └─8788 /app/cmd/controller/controller --v=2 --cluster-resource-namespace=cert-manager --leader-election-namespace=cert-manager --acme-http01-solver-image=harbor.atmosphere.dev/quay.io/jetstack/cert-manager-acmesolver:v1.12.17 --feature-gates=AdditionalCertificateOutputFormats=true --max-concurrent-challenges=60 │ ├─040e89c0321bb3cca7cb7ded0d39cdbe686a02957ae7e226292639c7b1d3e2c0 │ │ ├─31769 apache2 -DFOREGROUND │ │ ├─33888 (wsgi:h -DFOREGROUND │ │ ├─33889 (wsgi:h -DFOREGROUND │ │ ├─33890 (wsgi:h -DFOREGROUND │ │ ├─33891 (wsgi:h -DFOREGROUND │ │ ├─33892 (wsgi:h -DFOREGROUND │ │ ├─33893 apache2 -DFOREGROUND │ │ └─33894 apache2 -DFOREGROUND │ ├─14538e5ba1057174b67595a7d8bdc52aac9fd5da25dafc5643736b9d97c1f624 │ │ └─18736 /pause │ ├─d0c70b46083214bb9af0adfd1facd1ffc1449db2c67a26ea4a9ad4f884205902 │ │ └─30285 /pause │ ├─79352c6cd6328a6e4bda37f40444e8e2e4da015eb5cc6c713f7ee34adc7368be │ │ ├─31787 apache2 -DFOREGROUND │ │ ├─33771 (wsgi:h -DFOREGROUND │ │ ├─33772 (wsgi:h -DFOREGROUND │ │ ├─33773 (wsgi:h -DFOREGROUND │ │ ├─33774 (wsgi:h -DFOREGROUND │ │ ├─33775 (wsgi:h -DFOREGROUND │ │ ├─33776 apache2 -DFOREGROUND │ │ └─33777 apache2 -DFOREGROUND │ ├─f8bd0bd25137243a2992207a6584f155a29c6a8d484d836cc87f695bffd5907d │ │ ├─11149 /usr/bin/dumb-init -- /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─11161 /nginx-ingress-controller --default-backend-service=ingress-nginx/ingress-nginx-defaultbackend --publish-service=ingress-nginx/ingress-nginx-controller --election-id=ingress-nginx-leader --controller-class=k8s.io/ingress-nginx --ingress-class=atmosphere --configmap=ingress-nginx/ingress-nginx-controller --tcp-services-configmap=ingress-nginx/ingress-nginx-tcp --udp-services-configmap=ingress-nginx/ingress-nginx-udp --validating-webhook=:7443 --validating-webhook-certificate=/usr/local/certificates/cert --validating-webhook-key=/usr/local/certificates/key --enable-metrics=true │ │ ├─11266 nginx: master process /usr/bin/nginx -c /etc/nginx/nginx.conf │ │ ├─31375 nginx: worker process │ │ ├─31376 nginx: worker process │ │ └─31377 nginx: cache manager process │ ├─f51984bd292138b8fd98b517ed36f206d3702e5685702eab76cec6474069cdc0 │ │ └─23894 /bin/oauth2-proxy │ ├─1f28da2338282a1ed442fcbc04bfe001aaf6aebaf247149b8865490684a9fbe2 │ │ └─11809 /manager --metrics-bind-address=:9782 │ └─9b401dd7bdf4f795365674e0434387c8d844ac6b3f8e8400a6b0dbe14c3c3d7f │ └─8826 /app/cmd/webhook/webhook --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=cert-manager --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.cert-manager --dynamic-serving-dns-names=cert-manager-webhook.cert-manager.svc --feature-gates=AdditionalCertificateOutputFormats=true ├─proc-sys-fs-binfmt_misc.mount └─dev-hugepages.mount