insights-operator/gathers.json0000640000000000000000000005257415145102322015261 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig","duration_in_ms":19865,"records_count":167,"errors":["function \"machine_autoscalers\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-xvzq9.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-dsfkk.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":147,"records_count":20,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":164,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":42,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":122,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":13,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":40,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10843,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":15,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":16,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":66,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":33,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":134,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":19854,"records_count":70,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json\" was already recorded and had the fingerprint \"252e4f2dd027fe890cb7719bf1594347cd7b3a3389cb170ab2f6519c969c144e\", overwriting with the record having fingerprint \"252e4f2dd027fe890cb7719bf1594347cd7b3a3389cb170ab2f6519c969c144e\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\" was already recorded and had the fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\", overwriting with the record having fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\"","the record with the same name \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json\" was already recorded and had the fingerprint \"014101819ab4c860d6d8c679e08e6ea8b21cbd62dcb7ff4b01035dc3c7d6f01e\", overwriting with the record having fingerprint \"014101819ab4c860d6d8c679e08e6ea8b21cbd62dcb7ff4b01035dc3c7d6f01e\"","the record with the same name \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-xvzq9.json\" was already recorded and had the fingerprint \"e3624cd5a89b00f447c11e09eec96f6cdc690364c20b515abacaebbd4eadeddf\", overwriting with the record having fingerprint \"e3624cd5a89b00f447c11e09eec96f6cdc690364c20b515abacaebbd4eadeddf\"","the record with the same name \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json\" was already recorded and had the fingerprint \"d0b2999cdc67ee16e7183cfe51a28434ae3dc594a3a874860ee3e8476e5a8cd3\", overwriting with the record having fingerprint \"d0b2999cdc67ee16e7183cfe51a28434ae3dc594a3a874860ee3e8476e5a8cd3\"","the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json\" was already recorded and had the fingerprint \"ee4587ba3cfbe33a24ddff36f1cb6b2848af249d9681dacface4c24c2ba0ea81\", overwriting with the record having fingerprint \"ee4587ba3cfbe33a24ddff36f1cb6b2848af249d9681dacface4c24c2ba0ea81\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\" was already recorded and had the fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\", overwriting with the record having fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log\" was already recorded and had the fingerprint \"9f04cd487b42581568b909a2144a966a4dd045054aa0adda221b9baa0b923f3a\", overwriting with the record having fingerprint \"9f04cd487b42581568b909a2144a966a4dd045054aa0adda221b9baa0b923f3a\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_current.log\" was already recorded and had the fingerprint \"91a8746f144ee60cc92fbbf648297383a973bdd00e1611e8dc59a4c94f0c6082\", overwriting with the record having fingerprint \"91a8746f144ee60cc92fbbf648297383a973bdd00e1611e8dc59a4c94f0c6082\"","the record with the same name \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-dsfkk.json\" was already recorded and had the fingerprint \"26bd299b91e5893421dc5270d6d28fe6f38b3c77e547d49f9a2e4340801daa61\", overwriting with the record having fingerprint \"26bd299b91e5893421dc5270d6d28fe6f38b3c77e547d49f9a2e4340801daa61\"","the record with the same name \"config/pod/openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv.json\" was already recorded and had the fingerprint \"9f2e0806c56fca6eeb0ac6531c83b22d876a13625d3b2a9a44b812b1ab0c9ab8\", overwriting with the record having fingerprint \"9f2e0806c56fca6eeb0ac6531c83b22d876a13625d3b2a9a44b812b1ab0c9ab8\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json\" was already recorded and had the fingerprint \"5eb5ac1fcea3c2e2df3a83dc923d4c5566d766c32ebb194a70633bbff7aa5d71\", overwriting with the record having fingerprint \"5eb5ac1fcea3c2e2df3a83dc923d4c5566d766c32ebb194a70633bbff7aa5d71\""],"warnings":["warning: the record with the same fingerprint \"252e4f2dd027fe890cb7719bf1594347cd7b3a3389cb170ab2f6519c969c144e\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json\"","warning: the record with the same fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\"","warning: the record with the same fingerprint \"014101819ab4c860d6d8c679e08e6ea8b21cbd62dcb7ff4b01035dc3c7d6f01e\" was already recorded at path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json\", recording another one with a different path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json\"","warning: the record with the same fingerprint \"e3624cd5a89b00f447c11e09eec96f6cdc690364c20b515abacaebbd4eadeddf\" was already recorded at path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-xvzq9.json\", recording another one with a different path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-xvzq9.json\"","warning: the record with the same fingerprint \"d0b2999cdc67ee16e7183cfe51a28434ae3dc594a3a874860ee3e8476e5a8cd3\" was already recorded at path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json\", recording another one with a different path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json\"","warning: the record with the same fingerprint \"ee4587ba3cfbe33a24ddff36f1cb6b2848af249d9681dacface4c24c2ba0ea81\" was already recorded at path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json\", recording another one with a different path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json\"","warning: the record with the same fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\"","warning: the record with the same fingerprint \"9f04cd487b42581568b909a2144a966a4dd045054aa0adda221b9baa0b923f3a\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"91a8746f144ee60cc92fbbf648297383a973bdd00e1611e8dc59a4c94f0c6082\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_current.log\"","warning: the record with the same fingerprint \"26bd299b91e5893421dc5270d6d28fe6f38b3c77e547d49f9a2e4340801daa61\" was already recorded at path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-dsfkk.json\", recording another one with a different path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-dsfkk.json\"","warning: the record with the same fingerprint \"9f2e0806c56fca6eeb0ac6531c83b22d876a13625d3b2a9a44b812b1ab0c9ab8\" was already recorded at path \"config/pod/openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv.json\", recording another one with a different path \"config/pod/openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv.json\"","warning: the record with the same fingerprint \"5eb5ac1fcea3c2e2df3a83dc923d4c5566d766c32ebb194a70633bbff7aa5d71\" was already recorded at path \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json\", recording another one with a different path \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json\""],"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":13,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":16,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":154,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":37,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":59,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":161,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":13,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":16,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":255,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":12,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":43,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":55,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11610,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5423,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":18,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":31,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5422,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":14,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":37,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":136,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":12,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":25,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":30,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":26.236,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515145102322017755 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515145102322021057 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005336115145102322014240 0ustar0000000000000000{"pods":78,"imageCount":64,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:14398311b101163ddd1de78c093e161c5d3c9aac51a04e3d3d842fca6317ab0f","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:ad77d0ead8abca8b884fad3be18215dbe8b4f8f098053551e4a899298cf5c918","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:28df36269fc553eb1adba5566d6dfc258a1a74063c4cfe8b5bdd3f202591cf56","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3e90d0a6840e7f67900c763906a0628ddf209cb666c54c2dda0f4a84964a5cec","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":5,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000007775215145102315033742 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-67d4dbd88b-szr252026-02-17T15:09:42.707820033Z time="2026-02-17T15:09:42Z" level=info msg="Defaulting Interval to '12h0m0s'" 2026-02-17T15:09:42.717430969Z I0217 15:09:42.717374 1 handler.go:286] Adding GroupVersion packages.operators.coreos.com v1 to ResourceManager 2026-02-17T15:09:42.718680290Z time="2026-02-17T15:09:42Z" level=info msg="connection established. cluster-version: v1.31.14" 2026-02-17T15:09:42.718701540Z time="2026-02-17T15:09:42Z" level=info msg="operator ready" 2026-02-17T15:09:42.718701540Z time="2026-02-17T15:09:42Z" level=info msg="starting informers..." 2026-02-17T15:09:42.718729961Z time="2026-02-17T15:09:42Z" level=info msg="informers started" 2026-02-17T15:09:42.718729961Z time="2026-02-17T15:09:42Z" level=info msg="waiting for caches to sync..." 2026-02-17T15:09:42.819611298Z time="2026-02-17T15:09:42Z" level=info msg="starting workers..." 2026-02-17T15:09:42.819723080Z time="2026-02-17T15:09:42Z" level=info msg="connecting to source" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-02-17T15:09:42.819914045Z time="2026-02-17T15:09:42Z" level=info msg="connecting to source" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-02-17T15:09:42.820175551Z time="2026-02-17T15:09:42Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-02-17T15:09:42.820575272Z time="2026-02-17T15:09:42Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-02-17T15:09:42.837010774Z I0217 15:09:42.836928 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:09:42.837010774Z I0217 15:09:42.836965 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:09:42.837111957Z I0217 15:09:42.837032 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:09:42.837123157Z I0217 15:09:42.837114 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:42.837161619Z I0217 15:09:42.837124 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:09:42.837169999Z I0217 15:09:42.837136 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:09:42.837176729Z I0217 15:09:42.837166 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:42.837183539Z I0217 15:09:42.837175 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:42.837210510Z I0217 15:09:42.837152 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:09:42.837218580Z I0217 15:09:42.837205 1 secure_serving.go:213] Serving securely on [::]:5443 2026-02-17T15:09:42.837255091Z I0217 15:09:42.837226 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:09:42.837255091Z I0217 15:09:42.837179 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:09:42.837294432Z I0217 15:09:42.837252 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::apiserver.local.config/certificates/apiserver.crt::apiserver.local.config/certificates/apiserver.key" 2026-02-17T15:09:42.837294432Z I0217 15:09:42.837263 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:42.837405065Z I0217 15:09:42.837383 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:09:42.937692776Z I0217 15:09:42.937575 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:42.937796089Z I0217 15:09:42.937729 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:42.937829410Z I0217 15:09:42.937795 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:42.937856800Z I0217 15:09:42.937758 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:09:42.938017015Z I0217 15:09:42.937970 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:42.938027495Z I0217 15:09:42.937760 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:09:43.252945676Z E0217 15:09:43.252014 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.252945676Z E0217 15:09:43.252617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.252945676Z E0217 15:09:43.252798 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.253026509Z E0217 15:09:43.253006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.253178683Z E0217 15:09:43.253155 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.266410847Z E0217 15:09:43.266327 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.267368851Z E0217 15:09:43.267321 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.285199119Z E0217 15:09:43.285122 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.293216135Z E0217 15:09:43.293136 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.293440831Z E0217 15:09:43.293398 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.293599635Z E0217 15:09:43.293569 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.293762659Z E0217 15:09:43.293709 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.301605991Z E0217 15:09:43.301522 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.301907868Z E0217 15:09:43.301867 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.302066403Z E0217 15:09:43.302027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.302089794Z E0217 15:09:43.302059 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.302332889Z E0217 15:09:43.302294 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.308137112Z E0217 15:09:43.308093 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.308159462Z E0217 15:09:43.308138 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.308159462Z E0217 15:09:43.308145 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.308318296Z E0217 15:09:43.308104 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.315710367Z E0217 15:09:43.315650 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.364006964Z E0217 15:09:43.363959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.369956099Z E0217 15:09:43.363959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.370227506Z E0217 15:09:43.364002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.370625836Z E0217 15:09:43.364006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.371024546Z E0217 15:09:43.364034 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.458825332Z E0217 15:09:43.458772 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.459042377Z E0217 15:09:43.459023 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.459222041Z E0217 15:09:43.459196 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.459230301Z E0217 15:09:43.459221 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.459615391Z E0217 15:09:43.459566 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.626957790Z E0217 15:09:43.626892 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.626998071Z E0217 15:09:43.626947 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.626998071Z E0217 15:09:43.626955 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.627018861Z E0217 15:09:43.626892 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.627100423Z E0217 15:09:43.627063 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.956710425Z E0217 15:09:43.956635 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.956710425Z E0217 15:09:43.956675 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.956710425Z E0217 15:09:43.956678 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.956753656Z E0217 15:09:43.956721 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:43.956753656Z E0217 15:09:43.956719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:44.604905570Z E0217 15:09:44.604829 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:44.605324820Z E0217 15:09:44.605288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:44.605649648Z E0217 15:09:44.605623 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:44.605941035Z E0217 15:09:44.605917 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:44.606259513Z E0217 15:09:44.606234 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:45.889384235Z E0217 15:09:45.889309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:45.889433676Z E0217 15:09:45.889375 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:45.889596231Z E0217 15:09:45.889563 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:45.889682833Z E0217 15:09:45.889654 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:45.889714134Z E0217 15:09:45.889660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.459217820Z E0217 15:09:48.458047 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.459504786Z E0217 15:09:48.459435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.459653880Z E0217 15:09:48.459582 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.459713661Z E0217 15:09:48.459686 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.459889586Z E0217 15:09:48.459838 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.775539333Z E0217 15:09:52.771817 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.775539333Z E0217 15:09:52.771898 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.775539333Z E0217 15:09:52.772030 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.775539333Z E0217 15:09:52.772050 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.775539333Z E0217 15:09:52.771817 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:53.593968556Z E0217 15:09:53.588876 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:53.593968556Z E0217 15:09:53.588937 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:53.593968556Z E0217 15:09:53.589167 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:53.593968556Z E0217 15:09:53.589189 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:53.593968556Z E0217 15:09:53.589379 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000002401115145102315037117 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-t7n5b2026-02-17T15:08:55.085858253Z 2026-02-17T15:08:55Z INFO setup starting manager 2026-02-17T15:08:55.087987265Z 2026-02-17T15:08:55Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-17T15:08:55.088868977Z 2026-02-17T15:08:55Z INFO controller-runtime.metrics Starting metrics server 2026-02-17T15:08:55.089926943Z I0217 15:08:55.089873 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-17T15:08:55.090025135Z 2026-02-17T15:08:55Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-17T15:08:55.090117547Z 2026-02-17T15:08:55Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-17T15:08:55.105097316Z I0217 15:08:55.105042 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-17T15:08:55.108968520Z 2026-02-17T15:08:55Z DEBUG events package-server-manager-5c696dbdcd-t7n5b_89ef9d5d-9c2a-45bd-8192-30be90f5459e became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"b2a5ca10-b65f-41a9-bccf-69d728a477ec","apiVersion":"coordination.k8s.io/v1","resourceVersion":"8587"}, "reason": "LeaderElection"} 2026-02-17T15:08:55.109167776Z 2026-02-17T15:08:55Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-17T15:08:55.109167776Z 2026-02-17T15:08:55Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-17T15:08:55.109182086Z 2026-02-17T15:08:55Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-17T15:08:55.220079538Z 2026-02-17T15:08:55Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-17T15:08:55.222389125Z 2026-02-17T15:08:55Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-17T15:08:55.222748004Z 2026-02-17T15:08:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:08:55.222748004Z 2026-02-17T15:08:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:55.530942571Z 2026-02-17T15:08:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:55.530983642Z 2026-02-17T15:08:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:08:55.583094291Z 2026-02-17T15:08:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:08:55.583094291Z 2026-02-17T15:08:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.883110663Z 2026-02-17T15:09:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:40.883110663Z 2026-02-17T15:09:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.883110663Z 2026-02-17T15:09:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.883110663Z 2026-02-17T15:09:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:40.902860648Z 2026-02-17T15:09:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:40.902860648Z 2026-02-17T15:09:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.910914986Z 2026-02-17T15:09:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:40.910914986Z 2026-02-17T15:09:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.910973047Z 2026-02-17T15:09:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.911144851Z 2026-02-17T15:09:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:40.929743128Z 2026-02-17T15:09:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:40.929743128Z 2026-02-17T15:09:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.214036148Z 2026-02-17T15:09:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:41.214036148Z 2026-02-17T15:09:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.214093859Z 2026-02-17T15:09:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.214119030Z 2026-02-17T15:09:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:41.230729078Z 2026-02-17T15:09:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:41.230729078Z 2026-02-17T15:09:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.492884574Z 2026-02-17T15:09:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:41.492884574Z 2026-02-17T15:09:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.492884574Z 2026-02-17T15:09:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.492884574Z 2026-02-17T15:09:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:41.504919110Z 2026-02-17T15:09:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:41.504919110Z 2026-02-17T15:09:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.637813842Z 2026-02-17T15:09:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:41.637813842Z 2026-02-17T15:09:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.637870334Z 2026-02-17T15:09:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.637881504Z 2026-02-17T15:09:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:41.649766825Z 2026-02-17T15:09:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:41.649766825Z 2026-02-17T15:09:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415145102315035625 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-t7n5b2026-02-17T15:03:21.980861448Z W0217 15:03:21.980493 1 deprecated.go:66] 2026-02-17T15:03:21.980861448Z ==== Removed Flag Warning ====================== 2026-02-17T15:03:21.980861448Z 2026-02-17T15:03:21.980861448Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-17T15:03:21.980861448Z 2026-02-17T15:03:21.980861448Z =============================================== 2026-02-17T15:03:21.980861448Z 2026-02-17T15:03:21.981244897Z I0217 15:03:21.981191 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-17T15:03:21.982425415Z I0217 15:03:21.982397 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-17T15:03:21.982882546Z I0217 15:03:21.982826 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-17T15:03:21.983754087Z I0217 15:03:21.983707 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 package-server-manager_previous.log0000640000000000000000000004071415145102315037321 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-t7n5b2026-02-17T15:03:37.867893801Z 2026-02-17T15:03:37Z INFO setup starting manager 2026-02-17T15:03:37.870839933Z 2026-02-17T15:03:37Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-17T15:03:37.872564534Z 2026-02-17T15:03:37Z INFO controller-runtime.metrics Starting metrics server 2026-02-17T15:03:37.872564534Z 2026-02-17T15:03:37Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-17T15:03:37.872564534Z 2026-02-17T15:03:37Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-17T15:03:37.872564534Z I0217 15:03:37.871613 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-17T15:03:37.900386351Z I0217 15:03:37.900141 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-17T15:03:37.900386351Z 2026-02-17T15:03:37Z DEBUG events package-server-manager-5c696dbdcd-t7n5b_60269097-2ec7-4e51-82ec-75bf11f805fe became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"b2a5ca10-b65f-41a9-bccf-69d728a477ec","apiVersion":"coordination.k8s.io/v1","resourceVersion":"6805"}, "reason": "LeaderElection"} 2026-02-17T15:03:37.909323455Z 2026-02-17T15:03:37Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-17T15:03:37.909323455Z 2026-02-17T15:03:37Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-17T15:03:37.909323455Z 2026-02-17T15:03:37Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-17T15:03:38.041324579Z 2026-02-17T15:03:38Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-17T15:03:38.041414921Z 2026-02-17T15:03:38Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-17T15:03:38.045211303Z 2026-02-17T15:03:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:38.045227113Z 2026-02-17T15:03:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.358576326Z 2026-02-17T15:03:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.359227611Z 2026-02-17T15:03:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:38.408263266Z 2026-02-17T15:03:38Z INFO controllers.packageserver attempting to create the packageserver csv 2026-02-17T15:03:38.420570702Z 2026-02-17T15:03:38Z INFO controllers.packageserver updating csv spec 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:38.453914641Z 2026-02-17T15:03:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:38.453914641Z 2026-02-17T15:03:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.465902219Z 2026-02-17T15:03:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:38.465902219Z 2026-02-17T15:03:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.465902219Z 2026-02-17T15:03:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.465902219Z 2026-02-17T15:03:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:38.582281989Z 2026-02-17T15:03:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:38.582281989Z 2026-02-17T15:03:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:39.153517564Z 2026-02-17T15:03:39Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:39.153517564Z 2026-02-17T15:03:39Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:39.153569485Z 2026-02-17T15:03:39Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:39.153590216Z 2026-02-17T15:03:39Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:39.169793774Z 2026-02-17T15:03:39Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:39.169793774Z 2026-02-17T15:03:39Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:40.031546574Z 2026-02-17T15:03:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:40.031546574Z 2026-02-17T15:03:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:40.031546574Z 2026-02-17T15:03:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:40.031546574Z 2026-02-17T15:03:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:40.047492786Z 2026-02-17T15:03:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:40.047492786Z 2026-02-17T15:03:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:05:11.928532239Z E0217 15:05:11.928384 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-17T15:06:11.931598139Z E0217 15:06:11.931437 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-02-17T15:07:45.941241285Z E0217 15:07:45.941121 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-17T15:08:31.914836117Z 2026-02-17T15:08:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:08:31.914836117Z 2026-02-17T15:08:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.917589206Z 2026-02-17T15:08:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.919318058Z 2026-02-17T15:08:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:08:31.953859947Z 2026-02-17T15:08:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:08:31.953859947Z 2026-02-17T15:08:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.953971400Z 2026-02-17T15:08:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:08:31.953971400Z 2026-02-17T15:08:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.954127874Z 2026-02-17T15:08:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.954152094Z 2026-02-17T15:08:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:08:31.975996396Z 2026-02-17T15:08:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:08:31.975996396Z 2026-02-17T15:08:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:32.182648371Z 2026-02-17T15:08:32Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:08:32.182648371Z 2026-02-17T15:08:32Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:32.182648371Z 2026-02-17T15:08:32Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:32.182648371Z 2026-02-17T15:08:32Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:08:32.211548090Z 2026-02-17T15:08:32Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:08:32.211649892Z 2026-02-17T15:08:32Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:37.918510273Z E0217 15:08:37.918300 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-operator-lifecycle-manager/leases/packageserver-controller-lock": context deadline exceeded 2026-02-17T15:08:37.918510273Z I0217 15:08:37.918392 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition 2026-02-17T15:08:54.404938786Z 2026-02-17T15:08:54Z ERROR setup problem running manager {"error": "leader election lost"} 2026-02-17T15:08:54.404938786Z main.run 2026-02-17T15:08:54.404938786Z /build/cmd/package-server-manager/main.go:150 2026-02-17T15:08:54.404938786Z github.com/spf13/cobra.(*Command).execute 2026-02-17T15:08:54.404938786Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-02-17T15:08:54.404938786Z github.com/spf13/cobra.(*Command).ExecuteC 2026-02-17T15:08:54.404938786Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-02-17T15:08:54.404938786Z github.com/spf13/cobra.(*Command).Execute 2026-02-17T15:08:54.404938786Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-02-17T15:08:54.404938786Z main.main 2026-02-17T15:08:54.404938786Z /build/cmd/package-server-manager/main.go:43 2026-02-17T15:08:54.404938786Z runtime.main 2026-02-17T15:08:54.404938786Z /usr/lib/golang/src/runtime/proc.go:271 2026-02-17T15:08:54.404938786Z Error: leader election lost 2026-02-17T15:08:54.405010677Z encountered an error while executing the binary: leader election lost config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json0000640000000000000000000002340415145102315030356 0ustar0000000000000000{"metadata":{"name":"package-server-manager-5c696dbdcd-t7n5b","generateName":"package-server-manager-5c696dbdcd-","namespace":"openshift-operator-lifecycle-manager","uid":"33e819b0-5a3f-4c2d-9dc7-8b0231804cdb","resourceVersion":"9732","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"package-server-manager","pod-template-hash":"5c696dbdcd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"package-server-manager-5c696dbdcd","uid":"80b42443-90eb-46e1-8eba-e306f07119a5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"package-server-manager-serving-cert","secret":{"secretName":"package-server-manager-serving-cert","defaultMode":420}},{"name":"kube-api-access-wn8df","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://127.0.0.1:9090/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--logtostderr=true"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-wn8df","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}},{"name":"package-server-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","command":["/bin/psm","start"],"args":["--name","$(PACKAGESERVER_NAME)","--namespace","$(PACKAGESERVER_NAMESPACE)","--metrics=:9090"],"env":[{"name":"PACKAGESERVER_NAME","value":"packageserver"},{"name":"PACKAGESERVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c"},{"name":"PACKAGESERVER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"GOMEMLIMIT","value":"5MiB"}],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"kube-api-access-wn8df","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:30Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:30Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-17T15:03:21Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://2f9ba4a97ac9cd770106a84a1110df7d7052e82e019a496ab8462fc28fcb14fd","started":true,"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-wn8df","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"package-server-manager","state":{"running":{"startedAt":"2026-02-17T15:08:54Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"-manager/packageserver\"}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\tchecking to see if required RBAC exists\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\tconfimed required RBAC exists\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\tcurrently topology mode\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"highly available\": false}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\treconciliation result\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"res\": \"unchanged\"}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\tfinished request reconciliation\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\nE0217 15:08:37.918300 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-operator-lifecycle-manager/leases/packageserver-controller-lock\": context deadline exceeded\nI0217 15:08:37.918392 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition\n2026-02-17T15:08:54Z\tERROR\tsetup\tproblem running manager\t{\"error\": \"leader election lost\"}\nmain.run\n\t/build/cmd/package-server-manager/main.go:150\ngithub.com/spf13/cobra.(*Command).execute\n\t/build/vendor/github.com/spf13/cobra/command.go:985\ngithub.com/spf13/cobra.(*Command).ExecuteC\n\t/build/vendor/github.com/spf13/cobra/command.go:1117\ngithub.com/spf13/cobra.(*Command).Execute\n\t/build/vendor/github.com/spf13/cobra/command.go:1041\nmain.main\n\t/build/cmd/package-server-manager/main.go:43\nruntime.main\n\t/usr/lib/golang/src/runtime/proc.go:271\nError: leader election lost\nencountered an error while executing the binary: leader election lost\n","startedAt":"2026-02-17T15:03:37Z","finishedAt":"2026-02-17T15:08:54Z","containerID":"cri-o://76d6fd0b45765a0b596669cf9b7b85cd807449a57c73b14e34163f91a2995908"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","containerID":"cri-o://b86a492f597b80e76da870edbd5aa60b116fd208f8fcff47303644a8e0039f9b","started":true,"volumeMounts":[{"name":"kube-api-access-wn8df","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}olm-operator_current.log0000640000000000000000000005177415145102315033341 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-6b56bd877c-tk8xm2026-02-17T15:09:53.662355275Z time="2026-02-17T15:09:53Z" level=info msg="install strategy successful" csv=packageserver id=yGWDi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:53.761508180Z time="2026-02-17T15:09:53Z" level=info msg="install strategy successful" csv=packageserver id=DCJNO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:53.864948410Z time="2026-02-17T15:09:53Z" level=info msg="install strategy successful" csv=packageserver id=MjXTu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:53.964396911Z time="2026-02-17T15:09:53Z" level=info msg="install strategy successful" csv=packageserver id=fXiMv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.064829076Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=nCrCN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.164656838Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=sJvk6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.266240611Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=qOoQv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.366239407Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=Za5BA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.466820387Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=KrtV2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.567329414Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=T/WrL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.668499948Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=++ofw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.769492078Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=hVWln namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.863539437Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=9xnFe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:54.962786023Z time="2026-02-17T15:09:54Z" level=info msg="install strategy successful" csv=packageserver id=FjNeT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.067425533Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=FKwmX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.166796553Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=ShTKY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.271915323Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=PFw0A namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.367285885Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=jEHhw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.471529694Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=2A5l+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.570616467Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=Vmyhd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.672501408Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=oJJec namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.760234882Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=e8ZvL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.862259717Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=r80RZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:55.962565380Z time="2026-02-17T15:09:55Z" level=info msg="install strategy successful" csv=packageserver id=voahp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.062937964Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=JoVg1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.163593905Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=+RGc7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.265395834Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=jRLaP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.364908088Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=4sgkM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.465161229Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=9HbTV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.565249306Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=iWt3u namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.665444677Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=w3do2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.759981007Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=X/QWd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.862917065Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=XIf+W namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:56.959975717Z time="2026-02-17T15:09:56Z" level=info msg="install strategy successful" csv=packageserver id=MJKLP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.060582258Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=S9vrE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.162265584Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=Kjd6K namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.266825841Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=0H8m/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.361644069Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=mnE5m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.461939852Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=/IHFP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.560769558Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=0rGn5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.660830745Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=Mbo+6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.763768862Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=xRqcZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.862604489Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=FJdyC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:57.963277811Z time="2026-02-17T15:09:57Z" level=info msg="install strategy successful" csv=packageserver id=QrTS3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.063349927Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=gXPgG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.164917571Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=5LJDk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.261538474Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=75n1O namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.361606470Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=PIxaF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.461996055Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=8Ang5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.562163235Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=UfHqv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.662383895Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=7thmk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.762908513Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=C53sD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.867302505Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=gLijm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:58.960955245Z time="2026-02-17T15:09:58Z" level=info msg="install strategy successful" csv=packageserver id=0T0pe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.060633403Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=knw49 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.161541170Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=GdtVv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.261572476Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=UP2j/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.362300079Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=1JnAZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.460579252Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=DL2Ou namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.562071744Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=d4QpD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.661506335Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=y3Nvu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.760585057Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=u7+HA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.860618984Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=qrOQD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:09:59.961326996Z time="2026-02-17T15:09:59Z" level=info msg="install strategy successful" csv=packageserver id=rqWBw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:00.060613864Z time="2026-02-17T15:10:00Z" level=info msg="install strategy successful" csv=packageserver id=5U3yq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:00.199044893Z time="2026-02-17T15:10:00Z" level=info msg="install strategy successful" csv=packageserver id=M/DFa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:00.260022039Z time="2026-02-17T15:10:00Z" level=info msg="install strategy successful" csv=packageserver id=feZm6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:01.762973350Z time="2026-02-17T15:10:01Z" level=info msg="install strategy successful" csv=packageserver id=Pa/Di namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:01.900513636Z time="2026-02-17T15:10:01Z" level=info msg="install strategy successful" csv=packageserver id=XbcZK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.000124732Z time="2026-02-17T15:10:01Z" level=info msg="install strategy successful" csv=packageserver id=vlXD9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.108818571Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=BBBSM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.119133414Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=rOZc7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.127518640Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=paRvv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.135078785Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=BPhbz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.201132327Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=q9g11 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.302749632Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=gQOWc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.402420119Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=GGsgZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.414858694Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=gq7oF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.422693067Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=QJFkU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.431281878Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=7hjYa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.439860818Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=vVWDM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.449818843Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=V5jb8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.459562002Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=B/BaJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.470200733Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=N1cjU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.479322447Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=tkxMS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.487395775Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=SsTrT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.543144004Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=1AMrm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.643190390Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=1kEXq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.650120500Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=c/W6F namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.655660346Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=cWeom namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.661619592Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=e8zyq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.761491535Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=Y8Tm5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.861214093Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=bkJah namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:02.962207413Z time="2026-02-17T15:10:02Z" level=info msg="install strategy successful" csv=packageserver id=djn37 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:03.062926985Z time="2026-02-17T15:10:03Z" level=info msg="install strategy successful" csv=packageserver id=PI+6R namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:03.170513297Z time="2026-02-17T15:10:03Z" level=info msg="install strategy successful" csv=packageserver id=/3Dne namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:03.260825234Z time="2026-02-17T15:10:03Z" level=info msg="install strategy successful" csv=packageserver id=x5czZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:03.361964528Z time="2026-02-17T15:10:03Z" level=info msg="install strategy successful" csv=packageserver id=j+m76 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:03.460867895Z time="2026-02-17T15:10:03Z" level=info msg="install strategy successful" csv=packageserver id=B1qXQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:10:03.561021975Z time="2026-02-17T15:10:03Z" level=info msg="install strategy successful" csv=packageserver id=UcFge namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment collect-profiles_current.log0000640000000000000000000000037315145102315034170 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/collect-profiles-29522340-8cp6h2026-02-17T15:09:53.828095054Z time="2026-02-17T15:09:53Z" level=info msg="error verifying provided cert and key: cert file should not be empty" 2026-02-17T15:09:53.828095054Z time="2026-02-17T15:09:53Z" level=info msg="generating a new cert and key" config/pod/openshift-operator-lifecycle-manager/collect-profiles-29522340-8cp6h.json0000640000000000000000000001232415145102315026462 0ustar0000000000000000{"metadata":{"name":"collect-profiles-29522340-8cp6h","generateName":"collect-profiles-29522340-","namespace":"openshift-operator-lifecycle-manager","uid":"2a162205-f111-49b4-9f46-0b40b6184336","resourceVersion":"10394","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"batch.kubernetes.io/controller-uid":"b865abae-1d66-41ae-ab91-5049f2d8ffd0","batch.kubernetes.io/job-name":"collect-profiles-29522340","controller-uid":"b865abae-1d66-41ae-ab91-5049f2d8ffd0","job-name":"collect-profiles-29522340"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.71/23\"],\"mac_address\":\"0a:58:0a:80:00:47\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.71/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"batch/v1","kind":"Job","name":"collect-profiles-29522340","uid":"b865abae-1d66-41ae-ab91-5049f2d8ffd0","controller":true,"blockOwnerDeletion":true}],"finalizers":["batch.kubernetes.io/job-tracking"]},"spec":{"volumes":[{"name":"config-volume","configMap":{"name":"collect-profiles-config","defaultMode":420}},{"name":"secret-volume","secret":{"secretName":"pprof-cert","defaultMode":420}},{"name":"kube-api-access-5h6b7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"collect-profiles","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","command":["bin/collect-profiles"],"args":["-n","openshift-operator-lifecycle-manager","--config-mount-path","/etc/config","--cert-mount-path","/var/run/secrets/serving-cert","olm-operator-heap-:https://olm-operator-metrics:8443/debug/pprof/heap","catalog-operator-heap-:https://catalog-operator-metrics:8443/debug/pprof/heap"],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config-volume","mountPath":"/etc/config"},{"name":"secret-volume","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-5h6b7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"collect-profiles","serviceAccount":"collect-profiles","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"openshift-user-critical","priority":1000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z","reason":"ContainersNotReady","message":"containers with unready status: [collect-profiles]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z","reason":"ContainersNotReady","message":"containers with unready status: [collect-profiles]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:09:52Z","containerStatuses":[{"name":"collect-profiles","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","imageID":"","started":false,"volumeMounts":[{"name":"config-volume","mountPath":"/etc/config"},{"name":"secret-volume","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-5h6b7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}catalog-operator_current.log0000640000000000000000000005573015145102315034545 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-588944557d-kjh2v2026-02-17T15:09:18.898615157Z time="2026-02-17T15:09:18Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=HiVi2 2026-02-17T15:09:18.898615157Z time="2026-02-17T15:09:18Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=HiVi2 2026-02-17T15:09:18.898615157Z time="2026-02-17T15:09:18Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=HiVi2 2026-02-17T15:09:18.898615157Z time="2026-02-17T15:09:18Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=HiVi2 2026-02-17T15:09:18.898615157Z time="2026-02-17T15:09:18Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=HiVi2 2026-02-17T15:09:18.898615157Z time="2026-02-17T15:09:18Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:18.898615157Z time="2026-02-17T15:09:18Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:19.100643448Z time="2026-02-17T15:09:19Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=fdCLI 2026-02-17T15:09:19.100871093Z time="2026-02-17T15:09:19Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=fdCLI 2026-02-17T15:09:19.100915734Z time="2026-02-17T15:09:19Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=fdCLI 2026-02-17T15:09:19.101083098Z time="2026-02-17T15:09:19Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=fdCLI 2026-02-17T15:09:19.101123799Z time="2026-02-17T15:09:19Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=fdCLI 2026-02-17T15:09:19.101221362Z time="2026-02-17T15:09:19Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:19.101268353Z time="2026-02-17T15:09:19Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:19.698355522Z time="2026-02-17T15:09:19Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:19.698505596Z time="2026-02-17T15:09:19Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:19.698505596Z time="2026-02-17T15:09:19Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:19.698521427Z time="2026-02-17T15:09:19Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=h1KzO 2026-02-17T15:09:19.698521427Z time="2026-02-17T15:09:19Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:19.698521427Z time="2026-02-17T15:09:19Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:19.910237855Z time="2026-02-17T15:09:19Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:19.910397098Z time="2026-02-17T15:09:19Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:19.910397098Z time="2026-02-17T15:09:19Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:19.910448610Z time="2026-02-17T15:09:19Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=PhGu5 2026-02-17T15:09:19.910448610Z time="2026-02-17T15:09:19Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:19.910448610Z time="2026-02-17T15:09:19Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:20.899567404Z time="2026-02-17T15:09:20Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:20.899734328Z time="2026-02-17T15:09:20Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:20.899734328Z time="2026-02-17T15:09:20Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:20.899894533Z time="2026-02-17T15:09:20Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:20.899894533Z time="2026-02-17T15:09:20Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=h1KzO 2026-02-17T15:09:21.105768327Z time="2026-02-17T15:09:21Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:21.105861719Z time="2026-02-17T15:09:21Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:21.105861719Z time="2026-02-17T15:09:21Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:21.105993662Z time="2026-02-17T15:09:21Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:21.105993662Z time="2026-02-17T15:09:21Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=PhGu5 2026-02-17T15:09:23.465420220Z time="2026-02-17T15:09:23Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.465420220Z time="2026-02-17T15:09:23Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.780138747Z time="2026-02-17T15:09:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.780411264Z time="2026-02-17T15:09:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.780477535Z time="2026-02-17T15:09:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.780589068Z time="2026-02-17T15:09:23Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=CbyIq 2026-02-17T15:09:23.780639629Z time="2026-02-17T15:09:23Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.780685350Z time="2026-02-17T15:09:23Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.812599494Z time="2026-02-17T15:09:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.812976863Z time="2026-02-17T15:09:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.813037015Z time="2026-02-17T15:09:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.813218599Z time="2026-02-17T15:09:23Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.813266620Z time="2026-02-17T15:09:23Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CbyIq 2026-02-17T15:09:23.813384513Z time="2026-02-17T15:09:23Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.813444365Z time="2026-02-17T15:09:23Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.846539887Z time="2026-02-17T15:09:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.846732342Z time="2026-02-17T15:09:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.846776393Z time="2026-02-17T15:09:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.846831924Z time="2026-02-17T15:09:23Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=XcB+b 2026-02-17T15:09:23.846866655Z time="2026-02-17T15:09:23Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.846899196Z time="2026-02-17T15:09:23Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.913167843Z time="2026-02-17T15:09:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.913352588Z time="2026-02-17T15:09:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.913424290Z time="2026-02-17T15:09:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.913630044Z time="2026-02-17T15:09:23Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:23.913676916Z time="2026-02-17T15:09:23Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=XcB+b 2026-02-17T15:09:32.522235680Z time="2026-02-17T15:09:32Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.522235680Z time="2026-02-17T15:09:32Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.529361596Z time="2026-02-17T15:09:32Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.529444308Z time="2026-02-17T15:09:32Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.529444308Z time="2026-02-17T15:09:32Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.529471878Z time="2026-02-17T15:09:32Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=BHYyI 2026-02-17T15:09:32.529491659Z time="2026-02-17T15:09:32Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.529491659Z time="2026-02-17T15:09:32Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.542270442Z time="2026-02-17T15:09:32Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.542378105Z time="2026-02-17T15:09:32Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.542378105Z time="2026-02-17T15:09:32Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.542477667Z time="2026-02-17T15:09:32Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.542504098Z time="2026-02-17T15:09:32Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=BHYyI 2026-02-17T15:09:32.566129788Z time="2026-02-17T15:09:32Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.566129788Z time="2026-02-17T15:09:32Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.573301424Z time="2026-02-17T15:09:32Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.573416137Z time="2026-02-17T15:09:32Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.573427667Z time="2026-02-17T15:09:32Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.573445498Z time="2026-02-17T15:09:32Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=Wff2z 2026-02-17T15:09:32.573471298Z time="2026-02-17T15:09:32Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.573471298Z time="2026-02-17T15:09:32Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.584818557Z time="2026-02-17T15:09:32Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.584930689Z time="2026-02-17T15:09:32Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.584930689Z time="2026-02-17T15:09:32Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-wzsv7 current-pod.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.585017691Z time="2026-02-17T15:09:32Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:32.585017691Z time="2026-02-17T15:09:32Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Wff2z 2026-02-17T15:09:40.699443174Z time="2026-02-17T15:09:40Z" level=info msg="resolving sources" id=9+Ej5 namespace=openshift-operators 2026-02-17T15:09:40.699443174Z time="2026-02-17T15:09:40Z" level=info msg="checking if subscriptions need update" id=9+Ej5 namespace=openshift-operators 2026-02-17T15:09:40.704973680Z time="2026-02-17T15:09:40Z" level=info msg="No subscriptions were found in namespace openshift-operators" id=9+Ej5 namespace=openshift-operators 2026-02-17T15:09:40.707185164Z time="2026-02-17T15:09:40Z" level=info msg="resolving sources" id=Efce8 namespace=openshift-operators 2026-02-17T15:09:40.707185164Z time="2026-02-17T15:09:40Z" level=info msg="checking if subscriptions need update" id=Efce8 namespace=openshift-operators 2026-02-17T15:09:40.805545438Z time="2026-02-17T15:09:40Z" level=info msg="No subscriptions were found in namespace openshift-operators" id=Efce8 namespace=openshift-operators 2026-02-17T15:09:40.849561269Z time="2026-02-17T15:09:40Z" level=info msg="resolving sources" id=cv61S namespace=openshift-operator-lifecycle-manager 2026-02-17T15:09:40.849561269Z time="2026-02-17T15:09:40Z" level=info msg="checking if subscriptions need update" id=cv61S namespace=openshift-operator-lifecycle-manager 2026-02-17T15:09:40.905032832Z time="2026-02-17T15:09:40Z" level=info msg="No subscriptions were found in namespace openshift-operator-lifecycle-manager" id=cv61S namespace=openshift-operator-lifecycle-manager 2026-02-17T15:09:40.905032832Z time="2026-02-17T15:09:40Z" level=info msg="resolving sources" id=Nly+e namespace=openshift-operator-lifecycle-manager 2026-02-17T15:09:40.905067933Z time="2026-02-17T15:09:40Z" level=info msg="checking if subscriptions need update" id=Nly+e namespace=openshift-operator-lifecycle-manager 2026-02-17T15:09:40.907564943Z time="2026-02-17T15:09:40Z" level=info msg="No subscriptions were found in namespace openshift-operator-lifecycle-manager" id=Nly+e namespace=openshift-operator-lifecycle-manager route-controller-manager_current.log0000640000000000000000000004207215145102315037513 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-6978b88779-vp5tv2026-02-17T15:08:35.713753420Z I0217 15:08:35.713420 1 cmd.go:240] Using service-serving-cert provided certificates 2026-02-17T15:08:35.713984636Z I0217 15:08:35.713701 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:08:35.714392217Z I0217 15:08:35.714314 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:35.715401561Z I0217 15:08:35.715339 1 builder.go:298] route-controller-manager version 4.18.0-202601181315.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2026-02-17T15:08:35.716579731Z I0217 15:08:35.716525 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:08:54.476804730Z I0217 15:08:54.475827 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-17T15:08:54.487402479Z I0217 15:08:54.485129 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-17T15:08:54.487402479Z I0217 15:08:54.485162 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-17T15:08:54.487402479Z I0217 15:08:54.485208 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-17T15:08:54.487402479Z I0217 15:08:54.485218 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-17T15:08:54.491545511Z I0217 15:08:54.491468 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:08:54.491545511Z W0217 15:08:54.491504 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:08:54.491545511Z W0217 15:08:54.491510 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:08:54.491545511Z W0217 15:08:54.491515 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:08:54.491545511Z W0217 15:08:54.491519 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:08:54.491545511Z W0217 15:08:54.491523 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:08:54.491545511Z W0217 15:08:54.491527 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:08:54.491623413Z I0217 15:08:54.491589 1 genericapiserver.go:514] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-17T15:08:54.503043874Z I0217 15:08:54.499914 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-17T15:08:54.503043874Z I0217 15:08:54.500287 1 leaderelection.go:250] attempting to acquire leader lease openshift-route-controller-manager/openshift-route-controllers... 2026-02-17T15:08:54.505951405Z I0217 15:08:54.505867 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2026-02-17T15:08:54.505951405Z I0217 15:08:54.505891 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:08:54.505951405Z I0217 15:08:54.505921 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:08:54.505951405Z I0217 15:08:54.505932 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:08:54.506033477Z I0217 15:08:54.505953 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:08:54.506033477Z I0217 15:08:54.505959 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:08:54.506223822Z I0217 15:08:54.506164 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:16 +0000 UTC to 2028-02-17 15:03:17 +0000 UTC (now=2026-02-17 15:08:54.506110089 +0000 UTC))" 2026-02-17T15:08:54.506342915Z I0217 15:08:54.506297 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340916\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340915\" (2026-02-17 14:08:35 +0000 UTC to 2027-02-17 14:08:35 +0000 UTC (now=2026-02-17 15:08:54.506271403 +0000 UTC))" 2026-02-17T15:08:54.508491568Z I0217 15:08:54.506322 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-17T15:08:54.508491568Z I0217 15:08:54.508473 1 genericapiserver.go:662] [graceful-termination] waiting for shutdown to be initiated 2026-02-17T15:08:54.509577054Z I0217 15:08:54.509521 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:08:54.509765868Z I0217 15:08:54.509698 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2026-02-17T15:08:54.511651685Z I0217 15:08:54.511599 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-17T15:08:54.513200923Z I0217 15:08:54.512140 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-17T15:08:54.513200923Z I0217 15:08:54.512155 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-17T15:08:54.584701039Z I0217 15:08:54.584647 1 leaderelection.go:260] successfully acquired lease openshift-route-controller-manager/openshift-route-controllers 2026-02-17T15:08:54.585826006Z I0217 15:08:54.585805 1 controller_manager.go:36] Starting "openshift.io/ingress-ip" 2026-02-17T15:08:54.585870708Z I0217 15:08:54.585858 1 controller_manager.go:46] Started "openshift.io/ingress-ip" 2026-02-17T15:08:54.585900628Z I0217 15:08:54.585889 1 controller_manager.go:36] Starting "openshift.io/ingress-to-route" 2026-02-17T15:08:54.589910087Z I0217 15:08:54.584737 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-route-controller-manager", Name:"openshift-route-controllers", UID:"8a090796-a4b3-4869-9831-c7362729e310", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"8573", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' route-controller-manager-6978b88779-vp5tv_6de57360-0f8f-4daa-a944-ec19dfe53d10 became leader 2026-02-17T15:08:54.595484714Z I0217 15:08:54.595426 1 ingress.go:262] ingress-to-route metrics registered with prometheus 2026-02-17T15:08:54.595506144Z I0217 15:08:54.595480 1 controller_manager.go:46] Started "openshift.io/ingress-to-route" 2026-02-17T15:08:54.595506144Z I0217 15:08:54.595492 1 controller_manager.go:48] Started Route Controllers 2026-02-17T15:08:54.596090748Z I0217 15:08:54.596039 1 ingress.go:313] Starting controller 2026-02-17T15:08:54.598447006Z W0217 15:08:54.598401 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:08:54.598509598Z E0217 15:08:54.598484 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:08:54.598784794Z I0217 15:08:54.598747 1 reflector.go:359] Caches populated for *v1.IngressClass from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-17T15:08:54.599288106Z I0217 15:08:54.599237 1 reflector.go:359] Caches populated for *v1.Ingress from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-17T15:08:54.607298963Z I0217 15:08:54.607240 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:08:54.607375465Z I0217 15:08:54.607303 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:08:54.607440777Z I0217 15:08:54.607329 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:08:54.607629971Z I0217 15:08:54.607609 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-17 14:51:46 +0000 UTC to 2026-02-18 14:51:46 +0000 UTC (now=2026-02-17 15:08:54.60757222 +0000 UTC))" 2026-02-17T15:08:54.607876047Z I0217 15:08:54.607860 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:16 +0000 UTC to 2028-02-17 15:03:17 +0000 UTC (now=2026-02-17 15:08:54.607836776 +0000 UTC))" 2026-02-17T15:08:54.608068903Z I0217 15:08:54.608052 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340916\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340915\" (2026-02-17 14:08:35 +0000 UTC to 2027-02-17 14:08:35 +0000 UTC (now=2026-02-17 15:08:54.608033902 +0000 UTC))" 2026-02-17T15:08:54.608278908Z I0217 15:08:54.608262 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:44:42 +0000 UTC to 2036-02-15 14:44:42 +0000 UTC (now=2026-02-17 15:08:54.608243047 +0000 UTC))" 2026-02-17T15:08:54.608342079Z I0217 15:08:54.608330 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2026-02-18 14:51:47 +0000 UTC (now=2026-02-17 15:08:54.608298428 +0000 UTC))" 2026-02-17T15:08:54.608395490Z I0217 15:08:54.608384 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:08:54.60837013 +0000 UTC))" 2026-02-17T15:08:54.608435801Z I0217 15:08:54.608425 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:08:54.608411411 +0000 UTC))" 2026-02-17T15:08:54.608495793Z I0217 15:08:54.608482 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:51:45 +0000 UTC to 2036-02-15 14:51:45 +0000 UTC (now=2026-02-17 15:08:54.608451132 +0000 UTC))" 2026-02-17T15:08:54.608541904Z I0217 15:08:54.608531 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-17 14:51:46 +0000 UTC to 2026-02-18 14:51:46 +0000 UTC (now=2026-02-17 15:08:54.608517563 +0000 UTC))" 2026-02-17T15:08:54.611672471Z I0217 15:08:54.611639 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:16 +0000 UTC to 2028-02-17 15:03:17 +0000 UTC (now=2026-02-17 15:08:54.611604369 +0000 UTC))" 2026-02-17T15:08:54.611815924Z I0217 15:08:54.611797 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340916\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340915\" (2026-02-17 14:08:35 +0000 UTC to 2027-02-17 14:08:35 +0000 UTC (now=2026-02-17 15:08:54.611775153 +0000 UTC))" 2026-02-17T15:08:54.613659090Z I0217 15:08:54.613628 1 reflector.go:359] Caches populated for *v1.Service from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-17T15:08:54.686496488Z I0217 15:08:54.683928 1 reflector.go:359] Caches populated for *v1.Secret from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-17T15:08:55.455689023Z W0217 15:08:55.455446 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:08:55.455689023Z E0217 15:08:55.455530 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:08:57.439811146Z W0217 15:08:57.439729 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:08:57.439811146Z E0217 15:08:57.439782 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:09:03.059964441Z W0217 15:09:03.059891 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:09:03.059964441Z E0217 15:09:03.059942 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:09:14.260523454Z W0217 15:09:14.260388 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:09:14.260523454Z E0217 15:09:14.260469 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:09:39.109906198Z W0217 15:09:39.109846 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:09:39.109906198Z E0217 15:09:39.109882 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) route-controller-manager_previous.log0000640000000000000000000000231615145102315037702 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-6978b88779-vp5tv2026-02-17T15:07:35.692100600Z I0217 15:07:35.691827 1 cmd.go:240] Using service-serving-cert provided certificates 2026-02-17T15:07:35.692100600Z I0217 15:07:35.692036 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:07:35.692589312Z I0217 15:07:35.692521 1 observer_polling.go:159] Starting file observer 2026-02-17T15:07:35.693212208Z I0217 15:07:35.693170 1 builder.go:298] route-controller-manager version 4.18.0-202601181315.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2026-02-17T15:07:35.694110689Z I0217 15:07:35.694021 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:08:06.162300595Z F0217 15:08:06.162167 1 cmd.go:169] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-route-controller-manager/leases/openshift-route-controllers": context deadline exceeded config/pod/openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv.json0000640000000000000000000001730615145102315030327 0ustar0000000000000000{"metadata":{"name":"route-controller-manager-6978b88779-vp5tv","generateName":"route-controller-manager-6978b88779-","namespace":"openshift-route-controller-manager","uid":"3db03cef-d297-4bf7-8e52-dd0b18882d07","resourceVersion":"8925","creationTimestamp":"2026-02-17T15:03:38Z","labels":{"app":"route-controller-manager","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"6978b88779","route-controller-manager":"true"},"annotations":{"configmaps/client-ca":"5870","configmaps/config":"6986","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.52/23\"],\"mac_address\":\"0a:58:0a:80:00:34\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.52/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.52\"\n ],\n \"mac\": \"0a:58:0a:80:00:34\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"route-controller-manager-6978b88779","uid":"158f60ca-9dcc-4ea1-a53b-ea1db4942db4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"kube-api-access-xrg27","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"route-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","command":["route-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-xrg27","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000580000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"route-controller-manager-sa","serviceAccount":"route-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c14"},"runAsNonRoot":true,"fsGroup":1000580000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"route-controller-manager","openshift-route-controller-manager-anti-affinity":"true","route-controller-manager":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:24Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:59Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:59Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.52","podIPs":[{"ip":"10.128.0.52"}],"startTime":"2026-02-17T15:03:48Z","containerStatuses":[{"name":"route-controller-manager","state":{"running":{"startedAt":"2026-02-17T15:08:35Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:35.691827 1 cmd.go:240] Using service-serving-cert provided certificates\nI0217 15:07:35.692036 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:35.692521 1 observer_polling.go:159] Starting file observer\nI0217 15:07:35.693170 1 builder.go:298] route-controller-manager version 4.18.0-202601181315.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3\nI0217 15:07:35.694021 1 dynamic_serving_content.go:113] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0217 15:08:06.162167 1 cmd.go:169] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-route-controller-manager/leases/openshift-route-controllers\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:35Z","finishedAt":"2026-02-17T15:08:06Z","containerID":"cri-o://533491bcdd7a1e81be78b60edc3ff96d870551db82df44a567112342369f625f"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","containerID":"cri-o://8c91e52c0bffd71b1d402b7407e49fa1b2b0ea7c5b17f48e1de871ae6836ffa4","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-xrg27","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}controller-manager_current.log0000640000000000000000000005672115145102315034307 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-b9c8fdfbc-rh9v22026-02-17T15:08:56.360340583Z I0217 15:08:56.360279 1 reflector.go:368] Caches populated for *v1.ImageTagMirrorSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.361239086Z I0217 15:08:56.361066 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.361507432Z I0217 15:08:56.361328 1 reflector.go:368] Caches populated for *v1.RoleBinding from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.371524688Z I0217 15:08:56.371411 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.372842220Z I0217 15:08:56.372717 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.376405488Z W0217 15:08:56.375394 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-17T15:08:56.376522271Z E0217 15:08:56.376432 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-17T15:08:56.376552412Z I0217 15:08:56.376530 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.377303890Z I0217 15:08:56.377261 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.377624207Z I0217 15:08:56.377299 1 reflector.go:368] Caches populated for *v1.ImageDigestMirrorSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.378020578Z I0217 15:08:56.377936 1 reflector.go:368] Caches populated for *v1.CronJob from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.378170661Z I0217 15:08:56.378096 1 reflector.go:368] Caches populated for *v1.Image from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.378772756Z I0217 15:08:56.378728 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.381808140Z I0217 15:08:56.381681 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.381872813Z I0217 15:08:56.381829 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.383918702Z I0217 15:08:56.383872 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_urls 2026-02-17T15:08:56.383954653Z I0217 15:08:56.383905 1 registry_urls_observation_controller.go:147] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_urls" 2026-02-17T15:08:56.397976257Z I0217 15:08:56.397894 1 shared_informer.go:320] Caches are synced for service account 2026-02-17T15:08:56.399082835Z I0217 15:08:56.399036 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.401276788Z I0217 15:08:56.401195 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.414062612Z I0217 15:08:56.413989 1 shared_informer.go:320] Caches are synced for BuilderRoleBindingController 2026-02-17T15:08:56.427991894Z I0217 15:08:56.427951 1 shared_informer.go:320] Caches are synced for ImagePullerRoleBindingController 2026-02-17T15:08:56.428175609Z I0217 15:08:56.428081 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:56.438304178Z I0217 15:08:56.438231 1 shared_informer.go:320] Caches are synced for service account 2026-02-17T15:08:56.460776919Z I0217 15:08:56.460708 1 shared_informer.go:320] Caches are synced for DeployerRoleBindingController 2026-02-17T15:08:56.484310238Z I0217 15:08:56.484212 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret 2026-02-17T15:08:56.484351689Z I0217 15:08:56.484294 1 legacy_image_pull_secret_controller.go:138] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2026-02-17T15:08:56.484351689Z I0217 15:08:56.484293 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-token-secret 2026-02-17T15:08:56.484399650Z I0217 15:08:56.484359 1 legacy_token_secret_controller.go:110] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2026-02-17T15:08:56.484442751Z I0217 15:08:56.484413 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_kids 2026-02-17T15:08:56.484442751Z I0217 15:08:56.484430 1 keyid_observation_controller.go:172] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_kids" 2026-02-17T15:08:56.484442751Z I0217 15:08:56.484430 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_service-account 2026-02-17T15:08:56.484482232Z I0217 15:08:56.484432 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_image-pull-secret 2026-02-17T15:08:56.484502002Z I0217 15:08:56.484485 1 service_account_controller.go:346] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_service-account" 2026-02-17T15:08:56.484502002Z I0217 15:08:56.484494 1 image_pull_secret_controller.go:398] Waiting for service account token signing cert to be observed 2026-02-17T15:08:56.484518182Z I0217 15:08:56.484506 1 image_pull_secret_controller.go:384] Waiting for image registry urls to be observed 2026-02-17T15:08:56.484817210Z I0217 15:08:56.484762 1 image_pull_secret_controller.go:401] "Observed service account token signing certs" kids=["28W-C1AkAapJe51FSFyzbTHcaV_1zc063PCW7gt6ARs"] 2026-02-17T15:08:56.498594408Z I0217 15:08:56.498527 1 factory.go:80] Deployer controller caches are synced. Starting workers. 2026-02-17T15:08:56.521519050Z I0217 15:08:56.521388 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:08:57.227138685Z W0217 15:08:57.227051 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-17T15:08:57.227138685Z E0217 15:08:57.227116 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-17T15:08:57.300046335Z W0217 15:08:57.299953 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-17T15:08:57.300046335Z E0217 15:08:57.300031 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-17T15:08:57.316511119Z W0217 15:08:57.316424 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:08:57.316555450Z E0217 15:08:57.316526 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:08:57.456741442Z W0217 15:08:57.456502 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-17T15:08:57.456741442Z E0217 15:08:57.456559 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-17T15:08:57.504810293Z W0217 15:08:57.504756 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-17T15:08:57.504911415Z E0217 15:08:57.504895 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-17T15:08:57.939537165Z W0217 15:08:57.939499 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-17T15:08:57.939634008Z E0217 15:08:57.939620 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-17T15:08:59.012939670Z W0217 15:08:59.012837 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:08:59.012939670Z E0217 15:08:59.012897 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:08:59.034448728Z W0217 15:08:59.034405 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-17T15:08:59.034605921Z E0217 15:08:59.034578 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-17T15:09:00.086865896Z W0217 15:09:00.086727 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-17T15:09:00.086865896Z E0217 15:09:00.086771 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-17T15:09:00.413869634Z W0217 15:09:00.413825 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-17T15:09:00.413960237Z E0217 15:09:00.413946 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-17T15:09:00.538730650Z W0217 15:09:00.538637 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-17T15:09:00.538730650Z E0217 15:09:00.538714 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-17T15:09:00.983310786Z W0217 15:09:00.983235 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-17T15:09:00.983310786Z E0217 15:09:00.983287 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-17T15:09:03.182073039Z W0217 15:09:03.181977 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:09:03.182073039Z E0217 15:09:03.182037 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:09:03.476034546Z W0217 15:09:03.475933 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-17T15:09:03.476034546Z E0217 15:09:03.475978 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-17T15:09:04.287509109Z W0217 15:09:04.287427 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-17T15:09:04.287566011Z E0217 15:09:04.287512 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-17T15:09:04.331486969Z W0217 15:09:04.331279 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-17T15:09:04.331486969Z E0217 15:09:04.331337 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-17T15:09:04.633314320Z I0217 15:09:04.633204 1 reflector.go:368] Caches populated for *v1.Event from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-17T15:09:04.918341547Z W0217 15:09:04.918226 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-17T15:09:04.918341547Z E0217 15:09:04.918294 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-17T15:09:06.805408278Z W0217 15:09:06.805254 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-17T15:09:06.805408278Z E0217 15:09:06.805350 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-17T15:09:10.937124069Z W0217 15:09:10.936996 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-17T15:09:10.937124069Z E0217 15:09:10.937077 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-17T15:09:10.973805139Z W0217 15:09:10.973722 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-17T15:09:10.973864111Z E0217 15:09:10.973795 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-17T15:09:12.272294780Z W0217 15:09:12.272214 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:09:12.272294780Z E0217 15:09:12.272281 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:09:15.617765717Z W0217 15:09:15.617669 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-17T15:09:15.617765717Z E0217 15:09:15.617727 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-17T15:09:16.100435587Z W0217 15:09:16.100340 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-17T15:09:16.100435587Z E0217 15:09:16.100424 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-17T15:09:16.980804532Z W0217 15:09:16.980680 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-17T15:09:16.980804532Z E0217 15:09:16.980760 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-17T15:09:24.361709276Z W0217 15:09:24.361627 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-17T15:09:24.361760497Z E0217 15:09:24.361723 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-17T15:09:25.547357155Z W0217 15:09:25.547219 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-17T15:09:25.547357155Z E0217 15:09:25.547284 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-17T15:09:30.766223937Z W0217 15:09:30.766102 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-17T15:09:30.766223937Z E0217 15:09:30.766186 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-17T15:09:34.843417079Z W0217 15:09:34.843314 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-17T15:09:34.843417079Z E0217 15:09:34.843379 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-17T15:09:36.286946239Z W0217 15:09:36.286852 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:09:36.286946239Z E0217 15:09:36.286909 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:09:40.458740314Z W0217 15:09:40.458683 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-17T15:09:40.458775945Z E0217 15:09:40.458733 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" controller-manager_previous.log0000640000000000000000000006176415145102315034504 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-b9c8fdfbc-rh9v22026-02-17T15:04:28.733751021Z E0217 15:04:28.733722 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-config-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:04:28.733763031Z E0217 15:04:28.733746 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-controller-manager failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:04:28.766267300Z E0217 15:04:28.766185 1 service_account_controller.go:369] "Unhandled Error" err="openshift-operator-lifecycle-manager/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:04:28.766401893Z E0217 15:04:28.766344 1 service_account_controller.go:369] "Unhandled Error" err="openshift-operator-controller/operator-controller-controller-manager failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:04:28.766503005Z E0217 15:04:28.766436 1 service_account_controller.go:369] "Unhandled Error" err="openshift-operator-lifecycle-manager/olm-operator-serviceaccount failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:04:28.768748360Z E0217 15:04:28.768707 1 service_account_controller.go:369] "Unhandled Error" err="openshift-operators/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:04:28.777907029Z E0217 15:04:28.777851 1 service_account_controller.go:369] "Unhandled Error" err="openshift-operator-lifecycle-manager/collect-profiles failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:04:44.945107901Z E0217 15:04:44.944991 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-17T15:04:49.399969054Z W0217 15:04:49.399908 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:04:49.400109267Z E0217 15:04:49.400079 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:04:59.001122719Z E0217 15:04:59.001013 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-config-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:04:59.429714894Z W0217 15:04:59.429586 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-17T15:04:59.429714894Z E0217 15:04:59.429667 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-17T15:05:00.343442071Z W0217 15:05:00.343326 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-17T15:05:00.343442071Z E0217 15:05:00.343389 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-17T15:05:01.806694032Z E0217 15:05:01.806604 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-controller-manager failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.616385364Z E0217 15:05:02.616264 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-controller-manager-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.670804169Z E0217 15:05:02.670679 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-controller-manager failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.670908441Z E0217 15:05:02.670868 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-controller-manager-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.671205518Z E0217 15:05:02.671140 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-controller-manager-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.737507338Z E0217 15:05:02.737353 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-dns-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.737601240Z E0217 15:05:02.737567 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-dns failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.737653552Z E0217 15:05:02.737603 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-etcd failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.738200614Z E0217 15:05:02.738136 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-dns failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.738219025Z E0217 15:05:02.738195 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-etcd failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.738240795Z E0217 15:05:02.738227 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-etcd-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.738287786Z E0217 15:05:02.738261 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-dns-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.738308007Z E0217 15:05:02.738295 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-dns failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.738645085Z E0217 15:05:02.738578 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-dns-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.772392153Z E0217 15:05:02.772274 1 service_account_controller.go:369] "Unhandled Error" err="openshift-ovirt-infra/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.772392153Z E0217 15:05:02.772275 1 service_account_controller.go:369] "Unhandled Error" err="openshift-ovn-kubernetes/ovn-kubernetes-node failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.772651801Z E0217 15:05:02.772597 1 service_account_controller.go:369] "Unhandled Error" err="openshift-ovn-kubernetes/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.772681751Z E0217 15:05:02.772652 1 service_account_controller.go:369] "Unhandled Error" err="openshift-ovn-kubernetes/ovn-kubernetes-control-plane failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:02.780497548Z E0217 15:05:02.780378 1 service_account_controller.go:369] "Unhandled Error" err="openshift-route-controller-manager/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:04.640220974Z W0217 15:05:04.640116 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-17T15:05:04.640220974Z E0217 15:05:04.640191 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-17T15:05:07.176263535Z W0217 15:05:07.176166 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-17T15:05:07.176263535Z E0217 15:05:07.176226 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-17T15:05:08.759132873Z W0217 15:05:08.759076 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-17T15:05:08.759183374Z E0217 15:05:08.759142 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-17T15:05:33.006999404Z E0217 15:05:33.006837 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-etcd failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:35.811982670Z E0217 15:05:35.811898 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-etcd-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.619613027Z E0217 15:05:36.619500 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-host-network failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.674911561Z E0217 15:05:36.674789 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-etcd-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.675332381Z E0217 15:05:36.675244 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-host-network failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.675430263Z E0217 15:05:36.675370 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-host-network failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.740709566Z E0217 15:05:36.740646 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-image-registry failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.740732216Z E0217 15:05:36.740713 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-image-registry failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.740926531Z E0217 15:05:36.740891 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-infra failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.742235614Z E0217 15:05:36.742143 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-ingress failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.743155987Z E0217 15:05:36.743073 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-ingress-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.743155987Z E0217 15:05:36.743136 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-infra failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.743655849Z E0217 15:05:36.743593 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-infra failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.743683919Z E0217 15:05:36.743656 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-image-registry failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.743708250Z E0217 15:05:36.743696 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-ingress failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.779430878Z E0217 15:05:36.779335 1 service_account_controller.go:369] "Unhandled Error" err="openshift-service-ca-operator/service-ca-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.779430878Z E0217 15:05:36.779337 1 service_account_controller.go:369] "Unhandled Error" err="openshift-service-ca/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.779430878Z E0217 15:05:36.779341 1 service_account_controller.go:369] "Unhandled Error" err="openshift-service-ca-operator/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.779672684Z E0217 15:05:36.779574 1 service_account_controller.go:369] "Unhandled Error" err="openshift-route-controller-manager/route-controller-manager-sa failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:36.783719705Z E0217 15:05:36.783664 1 service_account_controller.go:369] "Unhandled Error" err="openshift-service-ca/service-ca failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:05:39.659958242Z W0217 15:05:39.659873 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-17T15:05:39.659958242Z E0217 15:05:39.659917 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-17T15:05:43.576178351Z W0217 15:05:43.576035 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:05:43.576178351Z E0217 15:05:43.576101 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:05:44.564818586Z W0217 15:05:44.564687 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-17T15:05:44.564818586Z E0217 15:05:44.564783 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-17T15:05:44.947546977Z E0217 15:05:44.947382 1 leaderelection.go:436] error retrieving resource lock openshift-controller-manager/openshift-master-controllers: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io openshift-master-controllers) 2026-02-17T15:05:56.027757711Z W0217 15:05:56.027651 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-17T15:05:56.027813122Z E0217 15:05:56.027754 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-17T15:05:57.495386687Z W0217 15:05:57.495294 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-17T15:05:57.495386687Z E0217 15:05:57.495371 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-17T15:05:57.863798381Z W0217 15:05:57.863725 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-17T15:05:57.863798381Z E0217 15:05:57.863776 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-17T15:05:57.942384214Z I0217 15:05:57.942298 1 leaderelection.go:297] failed to renew lease openshift-controller-manager/openshift-master-controllers: timed out waiting for the condition 2026-02-17T15:06:07.012676446Z E0217 15:06:07.012585 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-ingress failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:09.817718744Z E0217 15:06:09.817620 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-ingress-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.622915730Z E0217 15:06:10.622825 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-insights failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.679696651Z E0217 15:06:10.679608 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-ingress-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.679696651Z E0217 15:06:10.679628 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-insights failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.679696651Z E0217 15:06:10.679640 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-insights failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.745586468Z E0217 15:06:10.745013 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kni-infra failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.745586468Z E0217 15:06:10.745064 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kni-infra failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.745586468Z E0217 15:06:10.745138 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kni-infra failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.746357207Z E0217 15:06:10.745870 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kube-apiserver failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.746357207Z E0217 15:06:10.745954 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kube-apiserver failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.746408938Z E0217 15:06:10.746372 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kube-apiserver-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.746550263Z E0217 15:06:10.746447 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kube-controller-manager failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.746930492Z E0217 15:06:10.746898 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kube-apiserver failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.747145627Z E0217 15:06:10.747086 1 defaultrolebindings.go:186] "Unhandled Error" err="openshift-kube-apiserver-operator failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.783768277Z E0217 15:06:10.783692 1 service_account_controller.go:369] "Unhandled Error" err="assisted-installer/builder failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.783768277Z E0217 15:06:10.783733 1 service_account_controller.go:369] "Unhandled Error" err="openshift-user-workload-monitoring/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.784028403Z E0217 15:06:10.783949 1 service_account_controller.go:369] "Unhandled Error" err="openshift/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.784113615Z E0217 15:06:10.784070 1 service_account_controller.go:369] "Unhandled Error" err="openshift-vsphere-infra/default failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:10.789240673Z E0217 15:06:10.788928 1 service_account_controller.go:369] "Unhandled Error" err="default/builder failed with : Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-17T15:06:15.946974011Z W0217 15:06:15.946849 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:06:15.946974011Z E0217 15:06:15.946927 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:06:18.556657765Z W0217 15:06:18.556557 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-17T15:06:18.556657765Z E0217 15:06:18.556632 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-17T15:06:31.945769239Z E0217 15:06:31.945673 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-17T15:06:31.945854151Z W0217 15:06:31.945771 1 controller_manager.go:108] Controller Manager received stop signal: leaderelection lost config/pod/openshift-controller-manager/controller-manager-b9c8fdfbc-rh9v2.json0000640000000000000000000001562415145102315026252 0ustar0000000000000000{"metadata":{"name":"controller-manager-b9c8fdfbc-rh9v2","generateName":"controller-manager-b9c8fdfbc-","namespace":"openshift-controller-manager","uid":"e6d0ea7a-6784-4c13-ad65-6c947dbcf136","resourceVersion":"8480","creationTimestamp":"2026-02-17T15:03:38Z","labels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"b9c8fdfbc"},"annotations":{"configmaps/client-ca":"5859","configmaps/config":"6984","configmaps/openshift-global-ca":"4539","configmaps/openshift-service-ca":"5231","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.51/23\"],\"mac_address\":\"0a:58:0a:80:00:33\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.51/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.51\"\n ],\n \"mac\": \"0a:58:0a:80:00:33\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"controller-manager-b9c8fdfbc","uid":"8ed03960-ec26-49e0-a81c-56a366f28a82","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"proxy-ca-bundles","configMap":{"name":"openshift-global-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"kube-api-access-spcf4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","command":["openshift-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-spcf4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000570000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-sa","serviceAccount":"openshift-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c9"},"runAsNonRoot":true,"fsGroup":1000570000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:45Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:43Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:18Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:18Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:43Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.51","podIPs":[{"ip":"10.128.0.51"}],"startTime":"2026-02-17T15:03:43Z","containerStatuses":[{"name":"controller-manager","state":{"running":{"startedAt":"2026-02-17T15:07:17Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-17T15:03:44Z","finishedAt":"2026-02-17T15:06:31Z","containerID":"cri-o://3b54e0904c922403e7243ecec6e01879618fe54346e8502751862a4c275c3a59"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","containerID":"cri-o://fbf19d6eb89d3cc981a668b940fbc4bb8dd5e78643b56d6ce5b9a6d44a5d26d8","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-spcf4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator_current.log0000640000000000000000000001021115145102315045522 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-5f5f84757d-dsfkk2026-02-17T15:09:16.784387499Z I0217 15:09:16.784188 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:09:16.784767689Z I0217 15:09:16.784728 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:09:16.788798827Z I0217 15:09:16.788739 1 observer_polling.go:159] Starting file observer 2026-02-17T15:09:16.840037056Z I0217 15:09:16.839999 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202601170315.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-02-17T15:09:17.184169715Z I0217 15:09:17.184097 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:09:17.184307718Z W0217 15:09:17.184284 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:17.184356719Z W0217 15:09:17.184338 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:17.184404001Z W0217 15:09:17.184386 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:09:17.184451272Z W0217 15:09:17.184433 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:09:17.184536744Z W0217 15:09:17.184517 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:09:17.184581875Z W0217 15:09:17.184564 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:09:17.187593468Z I0217 15:09:17.187543 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-17T15:09:17.188284016Z I0217 15:09:17.187897 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager-operator/openshift-controller-manager-operator-lock... 2026-02-17T15:09:17.190492880Z I0217 15:09:17.189552 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-17T15:09:17.190631323Z I0217 15:09:17.190581 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:09:17.190631323Z I0217 15:09:17.190590 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:09:17.190729815Z I0217 15:09:17.190674 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:09:17.190729815Z I0217 15:09:17.190702 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:09:17.190762106Z I0217 15:09:17.190745 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:17.190781597Z I0217 15:09:17.190693 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:09:17.190834449Z I0217 15:09:17.190781 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:09:17.190851689Z I0217 15:09:17.190834 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:17.290980557Z I0217 15:09:17.290894 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:17.291190842Z I0217 15:09:17.290954 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:09:17.291351216Z I0217 15:09:17.291026 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file openshift-controller-manager-operator_previous.log0000640000000000000000000000251215145102315045721 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-5f5f84757d-dsfkk2026-02-17T15:06:43.853191017Z I0217 15:06:43.848083 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:06:43.853191017Z I0217 15:06:43.848247 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:06:43.853191017Z I0217 15:06:43.849004 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.058633327Z W0217 15:08:18.058452 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-controller-manager-operator-5f5f84757d) 2026-02-17T15:08:18.058947725Z I0217 15:08:18.058826 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202601170315.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-02-17T15:08:48.374856237Z F0217 15:08:48.374774 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock": context deadline exceeded openshift-controller-manager-operator-5f5f84757d-dsfkk.json0000640000000000000000000001661515145102315033601 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-5f5f84757d-dsfkk","generateName":"openshift-controller-manager-operator-5f5f84757d-","namespace":"openshift-controller-manager-operator","uid":"c7ed6ff7-56ba-4806-9e09-b8ae6d79cfda","resourceVersion":"9532","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"5f5f84757d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-5f5f84757d","uid":"37f81c5a-4233-4abd-9ffb-6ce07f3d467d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-8xbnc","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8xbnc","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c15"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-02-17T15:09:16Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:06:43.848083 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:06:43.848247 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:06:43.849004 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.058452 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-controller-manager-operator-5f5f84757d)\nI0217 15:08:18.058826 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202601170315.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0217 15:08:48.374774 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:06:43Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://81aaf4a8e92ad8167ce2d8a4500268568ecd4d12b11466d397ae290644672b32"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","containerID":"cri-o://afb6acf2a5178774fc88b9857020ac3a9778d76f3535d0f37b9711d4fea47c48","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8xbnc","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_current.log0000640000000000000000000001055315145102315031350 0ustar00000000000000002026-02-17T15:09:19.845501385Z I0217 15:09:19.844554 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-17T15:09:19.845627558Z I0217 15:09:19.845604 1 observer_polling.go:159] Starting file observer 2026-02-17T15:09:19.849475882Z I0217 15:09:19.845994 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:09:19.849475882Z I0217 15:09:19.846079 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:09:19.849475882Z I0217 15:09:19.846769 1 observer_polling.go:159] Starting file observer 2026-02-17T15:09:19.869621997Z I0217 15:09:19.867120 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601171614.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-17T15:09:20.546201178Z I0217 15:09:20.537865 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:09:20.546201178Z W0217 15:09:20.537893 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:20.546201178Z W0217 15:09:20.537897 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:20.546201178Z W0217 15:09:20.537901 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:09:20.546201178Z W0217 15:09:20.537904 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:09:20.546201178Z W0217 15:09:20.537908 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:09:20.546201178Z W0217 15:09:20.537911 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:09:20.546201178Z I0217 15:09:20.542394 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:09:20.546201178Z I0217 15:09:20.542495 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:09:20.546201178Z I0217 15:09:20.542543 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:09:20.546201178Z I0217 15:09:20.542560 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:09:20.546201178Z I0217 15:09:20.542596 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:20.546201178Z I0217 15:09:20.542600 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:20.546201178Z I0217 15:09:20.542979 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-17T15:09:20.546201178Z I0217 15:09:20.543030 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:09:20.546201178Z I0217 15:09:20.543065 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:09:20.546201178Z I0217 15:09:20.543703 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-17T15:09:20.546201178Z I0217 15:09:20.544149 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-02-17T15:09:20.642741539Z I0217 15:09:20.642639 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:09:20.642741539Z I0217 15:09:20.642712 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:20.645047806Z I0217 15:09:20.644983 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log0000640000000000000000000000302415145102315031535 0ustar00000000000000002026-02-17T15:07:18.177452357Z I0217 15:07:18.177094 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-17T15:07:18.177452357Z I0217 15:07:18.177379 1 observer_polling.go:159] Starting file observer 2026-02-17T15:07:18.177692343Z I0217 15:07:18.177643 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:07:18.177728844Z I0217 15:07:18.177697 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:07:18.178304068Z I0217 15:07:18.178249 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.310450543Z W0217 15:08:18.310368 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps etcd-operator-67bf55ccdd) 2026-02-17T15:08:18.310846634Z I0217 15:08:18.310779 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601171614.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-17T15:08:48.695656203Z F0217 15:08:48.695540 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock": context deadline exceeded config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json0000640000000000000000000002044415145102315024262 0ustar0000000000000000{"metadata":{"name":"etcd-operator-67bf55ccdd-pjm6n","generateName":"etcd-operator-67bf55ccdd-","namespace":"openshift-etcd-operator","uid":"f2546ffc-8d0a-4010-a3bd-9e69b6dbea40","resourceVersion":"9690","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"etcd-operator","pod-template-hash":"67bf55ccdd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-67bf55ccdd","uid":"f7b1f154-47c4-47a7-a96d-d2bb4e16f28a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-jcb68","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-jcb68","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:20Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:20Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-02-17T15:09:19Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.177094 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/\nI0217 15:07:18.177379 1 observer_polling.go:159] Starting file observer\nI0217 15:07:18.177643 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.177697 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.178249 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.310368 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps etcd-operator-67bf55ccdd)\nI0217 15:08:18.310779 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601171614.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9\nF0217 15:08:48.695540 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:18Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://47a0663eadceb8ac2b92b936021f5bf1e155eb2c91b070318a1766570bc56359"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","containerID":"cri-o://1cf423e31a88736056f1999dcd941a944e9de281f289a68cb4692796b704d37a","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-jcb68","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000003312115145102315034111 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-6bd884947c-tdlbn2026-02-17T15:03:38.880735494Z W0217 15:03:38.880205 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-17T15:03:38.880960009Z I0217 15:03:38.880923 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771340618 cert, and key in /tmp/serving-cert-426269394/serving-signer.crt, /tmp/serving-cert-426269394/serving-signer.key 2026-02-17T15:03:39.498236208Z I0217 15:03:39.497861 1 observer_polling.go:159] Starting file observer 2026-02-17T15:03:39.513899524Z I0217 15:03:39.513852 1 builder.go:304] check-endpoints version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-17T15:03:39.514692363Z I0217 15:03:39.514665 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" 2026-02-17T15:03:39.895963414Z I0217 15:03:39.895897 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-17T15:03:39.897259235Z I0217 15:03:39.897235 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-17T15:03:39.897259235Z I0217 15:03:39.897254 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-17T15:03:39.897276935Z I0217 15:03:39.897270 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-17T15:03:39.897285825Z I0217 15:03:39.897276 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-17T15:03:39.901330782Z I0217 15:03:39.901285 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:03:39.901330782Z W0217 15:03:39.901320 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:03:39.901349093Z W0217 15:03:39.901327 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:03:39.901349093Z W0217 15:03:39.901334 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:03:39.901349093Z W0217 15:03:39.901340 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:03:39.901349093Z W0217 15:03:39.901344 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:03:39.901359973Z W0217 15:03:39.901348 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:03:39.901749122Z I0217 15:03:39.901711 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-17T15:03:39.903437452Z I0217 15:03:39.903391 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:03:39.903437452Z I0217 15:03:39.903428 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:03:39.903437452Z I0217 15:03:39.903423 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:03:39.903491654Z I0217 15:03:39.903438 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:03:39.903491654Z I0217 15:03:39.903447 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:03:39.903491654Z I0217 15:03:39.903480 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:03:39.903525094Z I0217 15:03:39.903518 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:03:39.903534515Z I0217 15:03:39.903526 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:03:39.903972506Z I0217 15:03:39.903719 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" 2026-02-17T15:03:39.903972506Z I0217 15:03:39.903870 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771340618\" (2026-02-17 15:03:38 +0000 UTC to 2026-03-19 15:03:39 +0000 UTC (now=2026-02-17 15:03:39.903843783 +0000 UTC))" 2026-02-17T15:03:39.904049148Z I0217 15:03:39.904027 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340619\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340619\" (2026-02-17 14:03:39 +0000 UTC to 2027-02-17 14:03:39 +0000 UTC (now=2026-02-17 15:03:39.904003487 +0000 UTC))" 2026-02-17T15:03:39.904084998Z I0217 15:03:39.904057 1 secure_serving.go:213] Serving securely on [::]:17698 2026-02-17T15:03:39.904084998Z I0217 15:03:39.904080 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-17T15:03:39.904113819Z I0217 15:03:39.904097 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:03:39.905042491Z I0217 15:03:39.905001 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:03:39.907083000Z I0217 15:03:39.905268 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:03:39.907083000Z I0217 15:03:39.906883 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:03:39.907773316Z I0217 15:03:39.907744 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-02-17T15:03:40.004203888Z I0217 15:03:40.004153 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:03:40.004583277Z I0217 15:03:40.004559 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:44:42 +0000 UTC to 2036-02-15 14:44:42 +0000 UTC (now=2026-02-17 15:03:40.004533166 +0000 UTC))" 2026-02-17T15:03:40.004645190Z I0217 15:03:40.004608 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:03:40.004656800Z I0217 15:03:40.004636 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:03:40.004688371Z I0217 15:03:40.004674 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2026-02-18 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.004611309 +0000 UTC))" 2026-02-17T15:03:40.004749292Z I0217 15:03:40.004735 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.004719231 +0000 UTC))" 2026-02-17T15:03:40.004784713Z I0217 15:03:40.004775 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.004765532 +0000 UTC))" 2026-02-17T15:03:40.004816734Z I0217 15:03:40.004806 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:51:45 +0000 UTC to 2036-02-15 14:51:45 +0000 UTC (now=2026-02-17 15:03:40.004797593 +0000 UTC))" 2026-02-17T15:03:40.004989828Z I0217 15:03:40.004955 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771340618\" (2026-02-17 15:03:38 +0000 UTC to 2026-03-19 15:03:39 +0000 UTC (now=2026-02-17 15:03:40.004941636 +0000 UTC))" 2026-02-17T15:03:40.005111700Z I0217 15:03:40.005100 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340619\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340619\" (2026-02-17 14:03:39 +0000 UTC to 2027-02-17 14:03:39 +0000 UTC (now=2026-02-17 15:03:40.00508753 +0000 UTC))" 2026-02-17T15:03:40.005216473Z I0217 15:03:40.005205 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:44:42 +0000 UTC to 2036-02-15 14:44:42 +0000 UTC (now=2026-02-17 15:03:40.005194532 +0000 UTC))" 2026-02-17T15:03:40.005276154Z I0217 15:03:40.005248 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2026-02-18 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.005231933 +0000 UTC))" 2026-02-17T15:03:40.005310845Z I0217 15:03:40.005301 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.005291815 +0000 UTC))" 2026-02-17T15:03:40.005343996Z I0217 15:03:40.005335 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.005323915 +0000 UTC))" 2026-02-17T15:03:40.005381887Z I0217 15:03:40.005373 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:51:45 +0000 UTC to 2036-02-15 14:51:45 +0000 UTC (now=2026-02-17 15:03:40.005363846 +0000 UTC))" 2026-02-17T15:03:40.005413007Z I0217 15:03:40.005404 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-17 14:51:46 +0000 UTC to 2026-02-18 14:51:46 +0000 UTC (now=2026-02-17 15:03:40.005395037 +0000 UTC))" 2026-02-17T15:03:40.005583651Z I0217 15:03:40.005571 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771340618\" (2026-02-17 15:03:38 +0000 UTC to 2026-03-19 15:03:39 +0000 UTC (now=2026-02-17 15:03:40.005559561 +0000 UTC))" 2026-02-17T15:03:40.005707714Z I0217 15:03:40.005696 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340619\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340619\" (2026-02-17 14:03:39 +0000 UTC to 2027-02-17 14:03:39 +0000 UTC (now=2026-02-17 15:03:40.005685294 +0000 UTC))" 2026-02-17T15:03:40.202287238Z I0217 15:03:40.202226 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:03:40.208862925Z I0217 15:03:40.208809 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-02-17T15:03:40.208862925Z I0217 15:03:40.208847 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-6bd884947c-tdlbn/openshift-apiserver_current.log0000640000000000000000000011723015145102315031120 0ustar00000000000000002026-02-17T15:09:24.805835299Z E0217 15:09:24.805741 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:24.806330362Z E0217 15:09:24.806267 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:24.806745892Z E0217 15:09:24.806679 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:24.806771493Z E0217 15:09:24.806751 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:24.807025379Z E0217 15:09:24.806679 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:25.027074681Z E0217 15:09:25.025776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:25.027074681Z E0217 15:09:25.025812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:25.027074681Z E0217 15:09:25.025926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:25.027074681Z E0217 15:09:25.025776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:25.027074681Z E0217 15:09:25.025784 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.213766971Z E0217 15:09:47.213643 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.213766971Z E0217 15:09:47.213671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.213830583Z E0217 15:09:47.213772 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.214126061Z E0217 15:09:47.214061 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.214265694Z E0217 15:09:47.214192 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.369637989Z E0217 15:09:47.369259 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.369637989Z E0217 15:09:47.369448 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.369637989Z E0217 15:09:47.369274 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.369873344Z E0217 15:09:47.369806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.369973217Z E0217 15:09:47.369914 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.509523423Z E0217 15:09:47.509407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.509996015Z E0217 15:09:47.509946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.510289412Z E0217 15:09:47.510246 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.510655950Z E0217 15:09:47.510601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.511761158Z E0217 15:09:47.510901 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.541537348Z E0217 15:09:47.539299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.541537348Z E0217 15:09:47.539353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.541537348Z E0217 15:09:47.539521 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.541537348Z E0217 15:09:47.539538 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.541537348Z E0217 15:09:47.539335 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.642295572Z E0217 15:09:47.642227 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.642334903Z E0217 15:09:47.642307 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.642845286Z E0217 15:09:47.642801 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.642866887Z E0217 15:09:47.642845 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.644269231Z E0217 15:09:47.644219 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.774383946Z E0217 15:09:47.774317 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.774493228Z E0217 15:09:47.774432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.774683353Z E0217 15:09:47.774643 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.774782425Z E0217 15:09:47.774432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.774944209Z E0217 15:09:47.774921 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.566173295Z E0217 15:09:48.566109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.566603386Z E0217 15:09:48.566576 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.566796071Z E0217 15:09:48.566767 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.572281866Z E0217 15:09:48.571507 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:48.572281866Z E0217 15:09:48.571761 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.753343708Z E0217 15:09:52.753293 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.753851950Z E0217 15:09:52.753822 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754064015Z E0217 15:09:52.754040 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754102536Z E0217 15:09:52.754083 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754208508Z E0217 15:09:52.754190 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754232459Z E0217 15:09:52.754215 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754327211Z E0217 15:09:52.754309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754350973Z E0217 15:09:52.754334 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754443375Z E0217 15:09:52.754425 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754520307Z E0217 15:09:52.754491 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754591599Z E0217 15:09:52.754573 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754626609Z E0217 15:09:52.754610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754710761Z E0217 15:09:52.754694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754754362Z E0217 15:09:52.754736 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754821464Z E0217 15:09:52.754805 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754878985Z E0217 15:09:52.754861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754930077Z E0217 15:09:52.754912 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.754997698Z E0217 15:09:52.754979 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.755042269Z E0217 15:09:52.755024 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.755127701Z E0217 15:09:52.755108 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.755154762Z E0217 15:09:52.755136 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.755256204Z E0217 15:09:52.755237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.755303515Z E0217 15:09:52.755285 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.755370017Z E0217 15:09:52.755352 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.755439569Z E0217 15:09:52.755244 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761255801Z E0217 15:09:52.761219 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761436747Z E0217 15:09:52.761401 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761436747Z E0217 15:09:52.761425 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761580000Z E0217 15:09:52.761546 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761637011Z E0217 15:09:52.761617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761750754Z E0217 15:09:52.761721 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761803945Z E0217 15:09:52.761782 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761803945Z E0217 15:09:52.761793 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.761962419Z E0217 15:09:52.761936 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770027288Z E0217 15:09:52.769986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770264023Z E0217 15:09:52.770228 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770316834Z E0217 15:09:52.770292 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770373826Z E0217 15:09:52.770293 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770373826Z E0217 15:09:52.770366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770438857Z E0217 15:09:52.770404 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770513839Z E0217 15:09:52.770497 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770673183Z E0217 15:09:52.770645 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770673183Z E0217 15:09:52.770657 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.770745035Z E0217 15:09:52.770724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.771069062Z E0217 15:09:52.770843 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:54.815251751Z E0217 15:09:54.815172 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:54.815251751Z E0217 15:09:54.815222 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:54.815645391Z E0217 15:09:54.815560 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:54.815645391Z E0217 15:09:54.815622 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:54.815878797Z E0217 15:09:54.815831 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:55.029422269Z E0217 15:09:55.029357 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:55.029659585Z E0217 15:09:55.029632 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:55.029727087Z E0217 15:09:55.029700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:55.029774578Z E0217 15:09:55.029755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:55.034742610Z E0217 15:09:55.034719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315145102315040151 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-6d4655d9cf-5f5g92026-02-17T15:09:03.746021745Z I0217 15:09:03.745876 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:09:03.746193359Z I0217 15:09:03.746170 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:09:03.746603359Z I0217 15:09:03.746575 1 observer_polling.go:159] Starting file observer 2026-02-17T15:09:03.828794067Z I0217 15:09:03.828695 1 builder.go:304] openshift-apiserver-operator version - 2026-02-17T15:09:04.108549516Z I0217 15:09:04.108395 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:09:04.108549516Z W0217 15:09:04.108421 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:04.108549516Z W0217 15:09:04.108424 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:04.108549516Z W0217 15:09:04.108428 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:09:04.108549516Z W0217 15:09:04.108431 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:09:04.108549516Z W0217 15:09:04.108433 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:09:04.108549516Z W0217 15:09:04.108437 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:09:04.111807815Z I0217 15:09:04.111704 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:09:04.111807815Z I0217 15:09:04.111767 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:09:04.111944198Z I0217 15:09:04.111827 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:09:04.111944198Z I0217 15:09:04.111919 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:04.111965659Z I0217 15:09:04.111938 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:09:04.112087913Z I0217 15:09:04.112041 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:04.112310958Z I0217 15:09:04.112263 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:09:04.112660566Z I0217 15:09:04.112409 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-17T15:09:04.112689357Z I0217 15:09:04.112674 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:09:04.113663511Z I0217 15:09:04.113615 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-17T15:09:04.114027200Z I0217 15:09:04.113987 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2026-02-17T15:09:04.212842516Z I0217 15:09:04.212743 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:04.212842516Z I0217 15:09:04.212778 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:09:04.212996240Z I0217 15:09:04.212948 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file openshift-apiserver-operator_previous.log0000640000000000000000000000230315145102315040346 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-6d4655d9cf-5f5g92026-02-17T15:06:43.852195732Z I0217 15:06:43.852046 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:06:43.852195732Z I0217 15:06:43.852161 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:06:43.854316725Z I0217 15:06:43.854251 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.145620768Z W0217 15:08:18.145531 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-apiserver-operator-6d4655d9cf) 2026-02-17T15:08:18.146073759Z I0217 15:08:18.146029 1 builder.go:304] openshift-apiserver-operator version - 2026-02-17T15:08:48.762245827Z F0217 15:08:48.762150 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock": context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json0000640000000000000000000001646515145102315030105 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-6d4655d9cf-5f5g9","generateName":"openshift-apiserver-operator-6d4655d9cf-","namespace":"openshift-apiserver-operator","uid":"af61bda0-c7b4-489d-a671-eaa5299942fe","resourceVersion":"8960","creationTimestamp":"2026-02-17T15:00:43Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"6d4655d9cf"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-6d4655d9cf","uid":"7fb4208c-481a-4441-9e7b-6ef863969d05","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-jt7w4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-jt7w4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:03Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:03Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-02-17T15:09:03Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:06:43.852046 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:06:43.852161 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:06:43.854251 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.145531 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-apiserver-operator-6d4655d9cf)\nI0217 15:08:18.146029 1 builder.go:304] openshift-apiserver-operator version -\nF0217 15:08:48.762150 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:06:43Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://398a6ec9ab16d8c9b51a94b166012be81bd6e66e2c357cd186d8526d7f9bb69c"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","containerID":"cri-o://1cfd0ad488c82b15998a7888c979dda06fa4a01761beb9e5d6d35b295908c57a","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-jt7w4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515145102315042625 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-7485d55966-wcpf82026-02-17T15:09:01.836300028Z I0217 15:09:01.836093 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:09:01.836300028Z I0217 15:09:01.836248 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:09:01.836955504Z I0217 15:09:01.836884 1 observer_polling.go:159] Starting file observer 2026-02-17T15:09:01.901882398Z I0217 15:09:01.900855 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601180343.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-17T15:09:02.390573116Z I0217 15:09:02.387770 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:09:02.390573116Z W0217 15:09:02.387792 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:02.390573116Z W0217 15:09:02.387797 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:02.390573116Z W0217 15:09:02.387801 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:09:02.390573116Z W0217 15:09:02.387806 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:09:02.390573116Z W0217 15:09:02.387808 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:09:02.390573116Z W0217 15:09:02.387811 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:09:02.392657627Z I0217 15:09:02.392609 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:09:02.392657627Z I0217 15:09:02.392652 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:09:02.392742200Z I0217 15:09:02.392703 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:09:02.392742200Z I0217 15:09:02.392731 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:02.392755970Z I0217 15:09:02.392748 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:09:02.392765100Z I0217 15:09:02.392755 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:02.392986546Z I0217 15:09:02.392942 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-17T15:09:02.393067358Z I0217 15:09:02.393040 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-17T15:09:02.393125579Z I0217 15:09:02.393099 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:09:02.393274983Z I0217 15:09:02.393210 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:09:02.393274983Z I0217 15:09:02.393268 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-02-17T15:09:02.493556565Z I0217 15:09:02.493485 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:02.493624867Z I0217 15:09:02.493543 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:09:02.493624867Z I0217 15:09:02.493590 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000000251215145102315043020 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-7485d55966-wcpf82026-02-17T15:06:43.903780134Z I0217 15:06:43.903579 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:06:43.903940378Z I0217 15:06:43.903797 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:06:43.904513842Z I0217 15:06:43.904441 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.062062692Z W0217 15:08:18.061938 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-kube-scheduler-operator-7485d55966) 2026-02-17T15:08:18.062631876Z I0217 15:08:18.062517 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601180343.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-17T15:08:48.394890388Z F0217 15:08:48.394795 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock": context deadline exceeded config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json0000640000000000000000000001612215145102315031656 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-7485d55966-wcpf8","generateName":"openshift-kube-scheduler-operator-7485d55966-","namespace":"openshift-kube-scheduler-operator","uid":"2b167b7b-2280-4c82-ac78-71c57aebe503","resourceVersion":"8934","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"7485d55966"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-7485d55966","uid":"d2432b2e-cc7b-48e3-a0c6-530e6489960e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:01Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:01Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-02-17T15:09:01Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:06:43.903579 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:06:43.903797 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:06:43.904441 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.061938 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-kube-scheduler-operator-7485d55966)\nI0217 15:08:18.062517 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601180343.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31\nF0217 15:08:48.394795 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:06:43Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://477671fff24fa6c32a024908ab3cc22818f79df79458186eb17cd6a91eb44b4f"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","containerID":"cri-o://dfe6ffb450b0904261ab46cf367ace40b648e6342b7e1df240b49e249ecafeaa","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001320115145102315027151 0ustar00000000000000002026-02-17T15:03:39.801282293Z I0217 15:03:39.800519 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000b4d7c0 cert-secrets:0xc000b4d540 configmaps:0xc000b4d0e0 namespace:0xc000b4cf00 optional-configmaps:0xc000b4d220 optional-secrets:0xc000b4d180 pod:0xc000b4cfa0 pod-manifest-dir:0xc000b4d360 resource-dir:0xc000b4d2c0 revision:0xc000b4ce60 secrets:0xc000b4d040 v:0xc000b5c280] [0xc000b5c280 0xc000b4ce60 0xc000b4cf00 0xc000b4cfa0 0xc000b4d2c0 0xc000b4d360 0xc000b4d0e0 0xc000b4d220 0xc000b4d180 0xc000b4d040 0xc000b4d7c0 0xc000b4d540] [] map[cert-configmaps:0xc000b4d5e0 cert-dir:0xc000b4d7c0 cert-secrets:0xc000b4d540 configmaps:0xc000b4d0e0 help:0xc000b5c640 kubeconfig:0xc000b4cdc0 log-flush-frequency:0xc000b5c1e0 namespace:0xc000b4cf00 optional-cert-configmaps:0xc000b4d720 optional-cert-secrets:0xc000b4d680 optional-configmaps:0xc000b4d220 optional-secrets:0xc000b4d180 pod:0xc000b4cfa0 pod-manifest-dir:0xc000b4d360 pod-manifests-lock-file:0xc000b4d4a0 resource-dir:0xc000b4d2c0 revision:0xc000b4ce60 secrets:0xc000b4d040 timeout-duration:0xc000b4d400 v:0xc000b5c280 vmodule:0xc000b5c320] [0xc000b4cdc0 0xc000b4ce60 0xc000b4cf00 0xc000b4cfa0 0xc000b4d040 0xc000b4d0e0 0xc000b4d180 0xc000b4d220 0xc000b4d2c0 0xc000b4d360 0xc000b4d400 0xc000b4d4a0 0xc000b4d540 0xc000b4d5e0 0xc000b4d680 0xc000b4d720 0xc000b4d7c0 0xc000b5c1e0 0xc000b5c280 0xc000b5c320 0xc000b5c640] [0xc000b4d5e0 0xc000b4d7c0 0xc000b4d540 0xc000b4d0e0 0xc000b5c640 0xc000b4cdc0 0xc000b5c1e0 0xc000b4cf00 0xc000b4d720 0xc000b4d680 0xc000b4d220 0xc000b4d180 0xc000b4cfa0 0xc000b4d360 0xc000b4d4a0 0xc000b4d2c0 0xc000b4ce60 0xc000b4d040 0xc000b4d400 0xc000b5c280 0xc000b5c320] map[104:0xc000b5c640 118:0xc000b5c280] [] -1 0 0xc000b34d20 true 0x223d5a0 []} 2026-02-17T15:03:39.801282293Z I0217 15:03:39.800749 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0002ef040)({ 2026-02-17T15:03:39.801282293Z KubeConfig: (string) "", 2026-02-17T15:03:39.801282293Z KubeClient: (kubernetes.Interface) , 2026-02-17T15:03:39.801282293Z Revision: (string) (len=1) "3", 2026-02-17T15:03:39.801282293Z NodeName: (string) "", 2026-02-17T15:03:39.801282293Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-17T15:03:39.801282293Z Clock: (clock.RealClock) { 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-17T15:03:39.801282293Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:03:39.801282293Z (string) (len=31) "localhost-recovery-client-token" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:03:39.801282293Z (string) (len=12) "serving-cert" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-17T15:03:39.801282293Z (string) (len=18) "kube-scheduler-pod", 2026-02-17T15:03:39.801282293Z (string) (len=6) "config", 2026-02-17T15:03:39.801282293Z (string) (len=17) "serviceaccount-ca", 2026-02-17T15:03:39.801282293Z (string) (len=20) "scheduler-kubeconfig", 2026-02-17T15:03:39.801282293Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:03:39.801282293Z (string) (len=16) "policy-configmap" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-17T15:03:39.801282293Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-17T15:03:39.801282293Z CertConfigMapNamePrefixes: ([]string) , 2026-02-17T15:03:39.801282293Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-17T15:03:39.801282293Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-17T15:03:39.801282293Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-17T15:03:39.801282293Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-17T15:03:39.801282293Z Timeout: (time.Duration) 2m0s, 2026-02-17T15:03:39.801282293Z StaticPodManifestsLockFile: (string) "", 2026-02-17T15:03:39.801282293Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-17T15:03:39.801282293Z KubeletVersion: (string) "" 2026-02-17T15:03:39.801282293Z }) 2026-02-17T15:03:39.894683223Z I0217 15:03:39.894623 1 cmd.go:413] Getting controller reference for node master-0 2026-02-17T15:03:39.902053999Z I0217 15:03:39.902009 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-17T15:03:39.902077250Z I0217 15:03:39.902058 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:03:39.902077250Z I0217 15:03:39.902067 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:03:39.904108469Z I0217 15:03:39.904086 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-17T15:03:49.909322369Z I0217 15:03:49.909269 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-17T15:04:19.909673217Z I0217 15:04:19.909590 1 cmd.go:524] Getting installer pods for node master-0 2026-02-17T15:04:33.914120177Z F0217 15:04:33.914032 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001642415145102315022650 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"03da22e3-956d-4c8a-bfd6-c1778e5d627c","resourceVersion":"8474","creationTimestamp":"2026-02-17T15:03:38Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.47/23\"],\"mac_address\":\"0a:58:0a:80:00:2f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.47/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.47\"\n ],\n \"mac\": \"0a:58:0a:80:00:2f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"f9ac3021-63d0-4382-aaed-422018afae21"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:05:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:38Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:05:35Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:05:35Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:38Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.47","podIPs":[{"ip":"10.128.0.47"}],"startTime":"2026-02-17T15:03:38Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"[]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0217 15:03:39.894623 1 cmd.go:413] Getting controller reference for node master-0\nI0217 15:03:39.902009 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0217 15:03:39.902058 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:03:39.902067 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:03:39.904086 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0217 15:03:49.909269 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0217 15:04:19.909590 1 cmd.go:524] Getting installer pods for node master-0\nF0217 15:04:33.914032 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-17T15:03:39Z","finishedAt":"2026-02-17T15:04:33Z","containerID":"cri-o://848358e86030aaad08f0f93cbd72a6dd3c9d1bf771c63059da694d462594c54f"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","containerID":"cri-o://848358e86030aaad08f0f93cbd72a6dd3c9d1bf771c63059da694d462594c54f","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000005655015145102315030225 0ustar00000000000000002026-02-17T15:05:23.675348244Z postBind: {} 2026-02-17T15:05:23.675348244Z postFilter: {} 2026-02-17T15:05:23.675348244Z preBind: {} 2026-02-17T15:05:23.675348244Z preEnqueue: {} 2026-02-17T15:05:23.675348244Z preFilter: {} 2026-02-17T15:05:23.675348244Z preScore: {} 2026-02-17T15:05:23.675348244Z queueSort: {} 2026-02-17T15:05:23.675348244Z reserve: {} 2026-02-17T15:05:23.675348244Z score: {} 2026-02-17T15:05:23.675348244Z schedulerName: default-scheduler 2026-02-17T15:05:23.675348244Z > 2026-02-17T15:05:23.679221877Z I0217 15:05:23.679137 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-02-17T15:05:23.679221877Z I0217 15:05:23.679194 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-02-17T15:05:23.684905083Z I0217 15:05:23.684820 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:05:23.684926083Z I0217 15:05:23.684911 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:05:23.685445916Z I0217 15:05:23.685395 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-02-17T15:05:23.685759484Z I0217 15:05:23.685695 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771340663\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771340663\" (2026-02-17 14:04:23 +0000 UTC to 2027-02-17 14:04:23 +0000 UTC (now=2026-02-17 15:05:23.685650271 +0000 UTC))" 2026-02-17T15:05:23.686163513Z I0217 15:05:23.686082 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340663\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340663\" (2026-02-17 14:04:23 +0000 UTC to 2029-02-17 14:04:23 +0000 UTC (now=2026-02-17 15:05:23.68604482 +0000 UTC))" 2026-02-17T15:05:23.686219044Z I0217 15:05:23.686182 1 secure_serving.go:213] Serving securely on [::]:10259 2026-02-17T15:05:23.686833920Z I0217 15:05:23.686789 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:05:23.689147614Z I0217 15:05:23.689081 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.689299039Z I0217 15:05:23.689248 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.691014910Z I0217 15:05:23.690649 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.694487773Z I0217 15:05:23.691279 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.694487773Z I0217 15:05:23.691577 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.694487773Z I0217 15:05:23.692549 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.694487773Z I0217 15:05:23.692883 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.694487773Z I0217 15:05:23.693136 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.694487773Z I0217 15:05:23.693392 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.694487773Z I0217 15:05:23.693720 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.729549103Z I0217 15:05:23.728698 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.729549103Z I0217 15:05:23.728993 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-02-17T15:05:23.729549103Z I0217 15:05:23.729257 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-02-17T15:05:23.733481978Z I0217 15:05:23.730895 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.757479313Z I0217 15:05:23.757336 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.758101828Z I0217 15:05:23.758035 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.759656475Z I0217 15:05:23.759603 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:05:23.786167681Z I0217 15:05:23.785986 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:05:23.786516889Z I0217 15:05:23.786436 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:44:42 +0000 UTC to 2036-02-15 14:44:42 +0000 UTC (now=2026-02-17 15:05:23.786401256 +0000 UTC))" 2026-02-17T15:05:23.786516889Z I0217 15:05:23.786501 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2026-02-18 14:51:47 +0000 UTC (now=2026-02-17 15:05:23.786494749 +0000 UTC))" 2026-02-17T15:05:23.786544290Z I0217 15:05:23.786523 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:05:23.786517659 +0000 UTC))" 2026-02-17T15:05:23.786573900Z I0217 15:05:23.786543 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:05:23.7865372 +0000 UTC))" 2026-02-17T15:05:23.786581591Z I0217 15:05:23.786558 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-02-17T15:05:23.786774915Z I0217 15:05:23.786566 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:51:45 +0000 UTC to 2036-02-15 14:51:45 +0000 UTC (now=2026-02-17 15:05:23.78656008 +0000 UTC))" 2026-02-17T15:05:23.787062472Z I0217 15:05:23.787003 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771340663\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771340663\" (2026-02-17 14:04:23 +0000 UTC to 2027-02-17 14:04:23 +0000 UTC (now=2026-02-17 15:05:23.78697752 +0000 UTC))" 2026-02-17T15:05:23.787225787Z I0217 15:05:23.787180 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340663\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340663\" (2026-02-17 14:04:23 +0000 UTC to 2029-02-17 14:04:23 +0000 UTC (now=2026-02-17 15:05:23.787167344 +0000 UTC))" 2026-02-17T15:05:28.788140702Z E0217 15:05:28.787292 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:05:35.909322888Z E0217 15:05:35.909182 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:05:44.792050542Z E0217 15:05:44.790630 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:05:53.827839028Z E0217 15:05:53.827739 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:06:00.946036226Z E0217 15:06:00.945930 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:06:08.137654279Z E0217 15:06:08.137508 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:06:16.705330704Z E0217 15:06:16.705247 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:06:24.373389024Z E0217 15:06:24.373254 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:06:33.695543277Z E0217 15:06:33.695414 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:06:42.493547054Z E0217 15:06:42.493396 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:06:51.101967899Z E0217 15:06:51.101843 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:06:59.805196124Z E0217 15:06:59.805091 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:07:07.359981762Z E0217 15:07:07.359861 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:07:16.313615595Z E0217 15:07:16.313443 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:07:25.507440228Z E0217 15:07:25.507239 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:07:33.815763478Z E0217 15:07:33.815657 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:07:41.937018671Z E0217 15:07:41.936869 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:07:50.440196642Z E0217 15:07:50.440039 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:07:59.652316367Z E0217 15:07:59.652215 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:08:08.374497912Z E0217 15:08:08.374386 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:08:16.053645568Z E0217 15:08:16.053449 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:08:23.348072134Z E0217 15:08:23.347904 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:08:31.052435819Z E0217 15:08:31.052239 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:08:40.350445280Z E0217 15:08:40.350336 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io kube-scheduler) 2026-02-17T15:08:48.032878631Z E0217 15:08:48.032756 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:09:12.084515030Z I0217 15:09:12.084392 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-02-17T15:09:12.085330359Z I0217 15:09:12.085262 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-864ddd5f56-g8w2f" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:09:12.085600406Z I0217 15:09:12.085541 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-695b766898-nm8rs" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:09:12.086089708Z I0217 15:09:12.086019 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7d8f4c8c66-fc8n7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:09:12.086224801Z I0217 15:09:12.086175 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/collect-profiles-29522340-8cp6h" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:09:12.094127855Z I0217 15:09:12.093052 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-7dzgz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:12.095372745Z I0217 15:09:12.094496 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-wzsv7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:17.693935060Z I0217 15:09:17.693844 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-649c4f5445-7kdb7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:29.843992045Z I0217 15:09:29.843807 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-d8bf84b88-hmpc7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:34.168687423Z I0217 15:09:34.168591 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-6c46d95f74-nsmfx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:36.381489251Z I0217 15:09:36.381367 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-595c8f9ff-p8hbc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:37.690271944Z I0217 15:09:37.690106 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-f8cbff74c-hr9g4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:38.649992916Z I0217 15:09:38.649905 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d-8qkdw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:39.179251560Z I0217 15:09:39.179188 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-67fd9768b5-6dzpr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:40.296080431Z I0217 15:09:40.295984 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84976bb859-kmc95" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:40.311532120Z I0217 15:09:40.310589 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96-qbmw5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:40.311532120Z I0217 15:09:40.310902 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-cb4f7b4cf-cmbjq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:41.460521979Z I0217 15:09:41.460414 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b-szr25" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:41.562902943Z I0217 15:09:41.562802 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc-jdktd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:41.997089214Z I0217 15:09:41.995930 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-bd7dd5c46-g6fgz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:45.199886977Z I0217 15:09:45.199785 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-r6sfp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:51.449741492Z I0217 15:09:51.449643 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-686c884b4d-5q97f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:52.643753757Z I0217 15:09:52.643375 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-864ddd5f56-g8w2f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:52.649785355Z I0217 15:09:52.649699 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-7d8f4c8c66-fc8n7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:52.649785355Z I0217 15:09:52.649695 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-695b766898-nm8rs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:52.649785355Z I0217 15:09:52.649777 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/collect-profiles-29522340-8cp6h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:55.884131054Z I0217 15:09:55.882108 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-7485d645b8-nzz2j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:55.922137877Z I0217 15:09:55.922058 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-l576h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:09:56.445271461Z I0217 15:09:56.445203 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-8569dd85ff-f9g8s" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006737415145102315030425 0ustar00000000000000002026-02-17T15:00:43.803576672Z I0217 15:00:43.803441 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-5dc4688546-sg75p" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:43.899758370Z I0217 15:00:43.899680 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.000532039Z I0217 15:00:44.000150 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-7b87b97578-9fpgj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.104877858Z I0217 15:00:44.104766 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-ff6c9b66-k8xp8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.208912131Z I0217 15:00:44.208832 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-76959b6567-v49tq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:00:44.299392120Z I0217 15:00:44.299306 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-dsfkk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.400448106Z I0217 15:00:44.400363 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-755d954778-jrdqm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.501934762Z I0217 15:00:44.501859 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48-mzk89" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.602503587Z I0217 15:00:44.602416 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-nclxg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.701171299Z I0217 15:00:44.701022 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-7c6bdb986f-fcnqs" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.800288822Z I0217 15:00:44.800209 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:44.900162291Z I0217 15:00:44.900092 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-86b8869b79-lmqrr" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:45.003292024Z I0217 15:00:45.003185 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-96c8c64b8-dtwmd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:45.109515515Z I0217 15:00:45.109392 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-6cc5b65c6b-wqxmh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:45.269746421Z I0217 15:00:45.269639 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-588944557d-kjh2v" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:45.529020339Z I0217 15:00:45.526839 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-xvzq9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:45.823229637Z I0217 15:00:45.823034 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:46.236844499Z I0217 15:00:46.236604 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-6fcf4c966-l24cg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:00:46.250512855Z I0217 15:00:46.249928 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:46.540973358Z I0217 15:00:46.540894 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-cd5474998-tckph" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:46.961494736Z I0217 15:00:46.961194 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:47.672885036Z I0217 15:00:47.672811 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-756d64c8c4-ddgs9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:48.229954912Z I0217 15:00:48.229386 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-6b56bd877c-tk8xm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:48.313656280Z I0217 15:00:48.312566 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/collect-profiles-29522340-8cp6h" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:00:49.144878025Z I0217 15:00:49.144743 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-5fwlz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:01:20.597224383Z I0217 15:01:20.596626 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-wlg8w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:01:30.849636172Z I0217 15:01:30.848767 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-9r5rl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:01:31.040446711Z I0217 15:01:31.040370 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-9nv95" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:01:31.826015397Z I0217 15:01:31.825900 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-bnllz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:01:33.833510751Z I0217 15:01:33.833029 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-7c64d55f8-fzfsp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:01:43.233757793Z I0217 15:01:43.233602 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-bb7ffbb8d-rj245" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:01:43.441369327Z I0217 15:01:43.441296 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-4z5g9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:01:45.423130247Z I0217 15:01:45.423070 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7d8f4c8c66-fc8n7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:01:46.456088577Z I0217 15:01:46.456017 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-f25s7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:01:49.038748470Z I0217 15:01:49.038572 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-xwftw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:13.424891763Z I0217 15:02:13.424591 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-vdgrn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.461414266Z I0217 15:02:36.461310 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.461874 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-nclxg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.461980 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-5dc4688546-sg75p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.468617 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48-mzk89" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.468732 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.468715 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-755d954778-jrdqm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.468806 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-7c6bdb986f-fcnqs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.468976 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-xvzq9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469050 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-96c8c64b8-dtwmd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469127 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469138 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469179 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-cd5474998-tckph" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469206 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-588944557d-kjh2v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469178 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-86b8869b79-lmqrr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469260 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-6cc5b65c6b-wqxmh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469300 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469325 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-7b87b97578-9fpgj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469344 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-dsfkk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469383 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-ff6c9b66-k8xp8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469408 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-756d64c8c4-ddgs9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.470855813Z I0217 15:02:36.469472 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-7c64d55f8-fzfsp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.478281211Z I0217 15:02:36.478069 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-6b56bd877c-tk8xm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:36.503523186Z I0217 15:02:36.502185 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-v2h9q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:54.673651338Z E0217 15:02:54.673529 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-02-17T15:02:58.216109138Z I0217 15:02:58.215355 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-5bd989df77-hrl5d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:58.411580723Z I0217 15:02:58.408360 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-74b6595c6d-q4766" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:02:59.622313100Z I0217 15:02:59.622126 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-dc99ff586-qjjb5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:00.828648871Z I0217 15:03:00.827538 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6956dbf788-5r68h" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:00.834430931Z I0217 15:03:00.834377 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-69bd477586-66ml6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:01.112899976Z I0217 15:03:01.112825 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-676cd8b9b5-bfm5s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:02.625249475Z I0217 15:03:02.625208 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6fcbb7f9bd-gdt9b" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:03.960551398Z I0217 15:03:03.959844 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6fcbb7f9bd-gdt9b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:15.199727852Z I0217 15:03:15.199664 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-6578c4d554-6jl9n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:18.761664928Z I0217 15:03:18.761110 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-6bd884947c-tdlbn" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:19.801164951Z I0217 15:03:19.801073 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-67d67c799d-b9bj6" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:19.851709712Z I0217 15:03:19.850092 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-6965bd7478-x8mdg" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:19.923205286Z I0217 15:03:19.923110 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-6bd884947c-tdlbn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:20.476433140Z I0217 15:03:20.476342 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-67bc7c997f-jdfsm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:20.961093469Z I0217 15:03:20.960994 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-6965bd7478-x8mdg" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:21.042869110Z I0217 15:03:21.042781 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-67d67c799d-b9bj6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:23.270596649Z I0217 15:03:23.270375 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-85c9b89969-4n2ls" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:24.032280750Z I0217 15:03:24.030642 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-6965bd7478-x8mdg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:25.662348540Z I0217 15:03:25.662284 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-865765995-c58rq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:37.035205178Z I0217 15:03:37.035158 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-2ffzt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:37.617070708Z I0217 15:03:37.617018 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-695b766898-nm8rs" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:03:37.924527279Z I0217 15:03:37.924287 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-wxhtx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:38.078690425Z I0217 15:03:38.078620 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-7x72v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:38.179992964Z I0217 15:03:38.179696 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-864ddd5f56-g8w2f" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-17T15:03:38.391765121Z I0217 15:03:38.391714 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-tzv2h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:38.830270834Z I0217 15:03:38.828013 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-b9c8fdfbc-rh9v2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:38.892815763Z I0217 15:03:38.892770 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-xqt6f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:38.935479266Z I0217 15:03:38.935262 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:40.263013473Z I0217 15:03:40.262932 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-662mc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:41.262072906Z I0217 15:03:41.261979 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-sft6r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:43.375033143Z I0217 15:03:43.373944 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-17T15:03:43.517489627Z I0217 15:03:43.514962 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-b9c8fdfbc-rh9v2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:48.715631841Z I0217 15:03:48.714856 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:54.601281877Z I0217 15:03:54.601176 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-2lg56" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:03:54.601746517Z I0217 15:03:54.601710 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-t8vtc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-17T15:04:00.207204096Z E0217 15:04:00.207067 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-02-17T15:04:05.206009312Z E0217 15:04:05.205912 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-02-17T15:04:05.206009312Z I0217 15:04:05.205965 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-02-17T15:04:10.207554722Z E0217 15:04:10.207201 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-17T15:04:10.207554722Z E0217 15:04:10.207526 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515145102315023001 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"34550cc8-e37c-417a-98ae-78b1477771db","resourceVersion":"8470","creationTimestamp":"2026-02-17T15:01:26Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"9460ca0802075a8a6a10d7b3e6052c4d","kubernetes.io/config.mirror":"9460ca0802075a8a6a10d7b3e6052c4d","kubernetes.io/config.seen":"2026-02-17T15:00:08.620330462Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"0094b69a-edfe-40b7-b76a-0bab854d0992","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:24Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:24Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:02:47Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-02-17T15:04:23Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-17T15:00:20Z","finishedAt":"2026-02-17T15:04:10Z","containerID":"cri-o://4944adde3c461c436bd108e43bf28aecebbade517fd0bca757eeee8a5f2db7dc"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","containerID":"cri-o://2a42298516500c9bfa084c410231d2a27dee7fceed15779f0b27fd9d1349b2b0","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415145102315044404 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-78ff47c7c5-xvzq92026-02-17T15:09:17.886946179Z I0217 15:09:17.886812 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:09:17.886946179Z I0217 15:09:17.886927 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:09:17.887502093Z I0217 15:09:17.887431 1 observer_polling.go:159] Starting file observer 2026-02-17T15:09:17.903605989Z I0217 15:09:17.903526 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601161039.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-17T15:09:18.446502627Z I0217 15:09:18.446198 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:09:18.446502627Z W0217 15:09:18.446224 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:18.446502627Z W0217 15:09:18.446230 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:18.446502627Z W0217 15:09:18.446233 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:09:18.446502627Z W0217 15:09:18.446236 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:09:18.446502627Z W0217 15:09:18.446239 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:09:18.446502627Z W0217 15:09:18.446241 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:09:18.450491175Z I0217 15:09:18.448532 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:09:18.450491175Z I0217 15:09:18.448555 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-17T15:09:18.450491175Z I0217 15:09:18.448577 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:09:18.450491175Z I0217 15:09:18.448590 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:09:18.450491175Z I0217 15:09:18.448615 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:18.450491175Z I0217 15:09:18.448627 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:09:18.450491175Z I0217 15:09:18.448640 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:18.450491175Z I0217 15:09:18.448890 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-02-17T15:09:18.450491175Z I0217 15:09:18.449012 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-17T15:09:18.450491175Z I0217 15:09:18.449012 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:09:18.450491175Z I0217 15:09:18.449035 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:09:18.550743697Z I0217 15:09:18.550633 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:18.551050114Z I0217 15:09:18.550973 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:18.551147726Z I0217 15:09:18.551055 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController kube-controller-manager-operator_previous.log0000640000000000000000000000250015145102315044576 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-78ff47c7c5-xvzq92026-02-17T15:07:18.878041705Z I0217 15:07:18.877867 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:07:18.878157898Z I0217 15:07:18.878031 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:07:18.879157493Z I0217 15:07:18.879085 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.898048434Z W0217 15:08:18.897907 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-controller-manager-operator-78ff47c7c5) 2026-02-17T15:08:18.898314940Z I0217 15:08:18.898262 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601161039.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-17T15:08:49.045222745Z F0217 15:08:49.045172 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock": context deadline exceeded kube-controller-manager-operator-78ff47c7c5-xvzq9.json0000640000000000000000000001674115145102315033532 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-78ff47c7c5-xvzq9","generateName":"kube-controller-manager-operator-78ff47c7c5-","namespace":"openshift-kube-controller-manager-operator","uid":"553d4535-9985-47e2-83ee-8fcfb6035e7b","resourceVersion":"9635","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"78ff47c7c5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-78ff47c7c5","uid":"28cc336e-10a3-4bf6-9315-b5ba1a4c5c2d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffa02bd6af0b44d4955aba57f727e13671f503393926be6d8965e31dcfcd6e3c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-02-17T15:09:17Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.877867 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.878031 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.879085 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.897907 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-controller-manager-operator-78ff47c7c5)\nI0217 15:08:18.898262 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601161039.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb\nF0217 15:08:49.045172 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:18Z","finishedAt":"2026-02-17T15:08:49Z","containerID":"cri-o://13fd27ae7e51b2ce5e96bcf2c8231506a7b48822721ae68c680d8a96bd1e5103"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","containerID":"cri-o://e5a73638e40c519ad84123382ac658619b9dc2d362942e0bd81784b6f5c9f036","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-controller-manager-recovery-controller_current.log0000640000000000000000000004736215145102315042047 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-02-17T15:08:37.307543432Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 9443 \))" ]; do sleep 1; done' 2026-02-17T15:08:37.315355206Z ++ ss -Htanop '(' sport = 9443 ')' 2026-02-17T15:08:37.330618435Z + '[' -n '' ']' 2026-02-17T15:08:37.331925038Z + exec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-controller-manager --listen=0.0.0.0:9443 -v=2 2026-02-17T15:08:37.413987706Z W0217 15:08:37.413762 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-17T15:08:37.414323345Z I0217 15:08:37.414250 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1771340917 cert, and key in /tmp/serving-cert-1336392600/serving-signer.crt, /tmp/serving-cert-1336392600/serving-signer.key 2026-02-17T15:08:37.760257581Z I0217 15:08:37.760159 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:08:37.761080231Z I0217 15:08:37.761006 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:37.761210594Z I0217 15:08:37.761047 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:08:37.761210594Z I0217 15:08:37.761187 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:08:37.767604273Z W0217 15:08:37.767530 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:37.767892420Z I0217 15:08:37.767836 1 builder.go:304] cert-recovery-controller version 4.18.0-202601161039.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-17T15:08:37.775139870Z W0217 15:08:37.775074 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:37.775390026Z I0217 15:08:37.775346 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager/cert-recovery-controller-lock... 2026-02-17T15:08:37.775733895Z I0217 15:08:37.775668 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-controller-manager", Name:"openshift-kube-controller-manager", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:37.780662777Z E0217 15:08:37.780556 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:37.784849791Z E0217 15:08:37.784770 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:08:39.474513775Z E0217 15:08:39.474305 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:08:49.481481436Z E0217 15:08:49.481293 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:08:59.488401693Z E0217 15:08:59.488290 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:09:09.493196688Z E0217 15:09:09.493012 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:09:16.445723184Z E0217 15:09:16.445518 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:09:19.499365176Z E0217 15:09:19.499239 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:09:29.507865473Z E0217 15:09:29.507752 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:09:39.514688177Z E0217 15:09:39.514601 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:09:49.523002018Z E0217 15:09:49.522871 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.1895112e0418cd68 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,LastTimestamp:2026-02-17 15:08:37.775060328 +0000 UTC m=+0.436925847,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" kube-controller-manager-cert-syncer_current.log0000640000000000000000000003603315145102315040257 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-02-17T15:08:37.080671834Z I0217 15:08:37.080429 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-02-17T15:08:37.080671834Z I0217 15:08:37.080496 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:37.084879679Z W0217 15:08:37.084771 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:37.084973841Z E0217 15:08:37.084929 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:37.086388006Z W0217 15:08:37.086304 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:37.086410397Z E0217 15:08:37.086395 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:38.398224992Z W0217 15:08:38.398096 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:38.398224992Z E0217 15:08:38.398166 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:38.686919076Z W0217 15:08:38.686767 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:38.686919076Z E0217 15:08:38.686892 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:41.056423241Z W0217 15:08:41.056221 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:41.056423241Z E0217 15:08:41.056328 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:41.118262868Z W0217 15:08:41.118170 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:41.118262868Z E0217 15:08:41.118253 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:45.946013744Z W0217 15:08:45.945891 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:45.946013744Z E0217 15:08:45.945970 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:46.718667154Z W0217 15:08:46.718551 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:46.718667154Z E0217 15:08:46.718637 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:54.076081691Z W0217 15:08:54.075977 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:54.076081691Z E0217 15:08:54.076053 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:08:56.319898320Z W0217 15:08:56.319782 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:08:56.319959952Z E0217 15:08:56.319897 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:09:10.382139353Z W0217 15:09:10.381994 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:09:10.382365969Z E0217 15:09:10.382333 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:09:12.868913988Z W0217 15:09:12.868796 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:09:12.868913988Z E0217 15:09:12.868895 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:09:37.081044686Z W0217 15:09:37.080924 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:09:37.081106547Z E0217 15:09:37.081051 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" cluster-policy-controller_current.log0000640000000000000000000005303715145102315036446 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-02-17T15:08:55.025592843Z I0217 15:08:55.025586 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:webhook" not found 2026-02-17T15:08:55.033876517Z I0217 15:08:55.033838 1 reflector.go:368] Caches populated for *v1.ClusterRole from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.035775963Z I0217 15:08:55.035726 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.035951937Z I0217 15:08:55.035928 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.039295780Z I0217 15:08:55.039253 1 reflector.go:368] Caches populated for *v1.RoleBinding from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.040803747Z E0217 15:08:55.040363 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-image-registry" should be enqueued: namespace "openshift-image-registry" not found 2026-02-17T15:08:55.040803747Z E0217 15:08:55.040572 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-machine-api" should be enqueued: namespace "openshift-machine-api" not found 2026-02-17T15:08:55.040803747Z I0217 15:08:55.040654 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "monitoring-alertmanager-edit" not found 2026-02-17T15:08:55.040803747Z E0217 15:08:55.040717 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-network-node-identity" should be enqueued: namespace "openshift-network-node-identity" not found 2026-02-17T15:08:55.040959181Z E0217 15:08:55.040868 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-02-17T15:08:55.107587716Z I0217 15:08:55.107517 1 base_controller.go:74] Caches are synced for WebhookAuthenticatorCertApprover_csr-approver-controller 2026-02-17T15:08:55.107674858Z I0217 15:08:55.107663 1 base_controller.go:111] Starting #1 worker of WebhookAuthenticatorCertApprover_csr-approver-controller controller ... 2026-02-17T15:08:55.190904102Z I0217 15:08:55.190819 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.387870528Z I0217 15:08:55.387788 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.392506932Z I0217 15:08:55.392404 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.473546552Z I0217 15:08:55.473493 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.593249130Z I0217 15:08:55.593166 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.656208196Z I0217 15:08:55.656120 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.788166075Z I0217 15:08:55.788076 1 reflector.go:368] Caches populated for *v1.PodTemplate from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.791024836Z I0217 15:08:55.790953 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:55.932346025Z W0217 15:08:55.932273 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:08:55.932597642Z E0217 15:08:55.932552 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:08:55.992082572Z I0217 15:08:55.992000 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.000694413Z I0217 15:08:56.000638 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.188227048Z I0217 15:08:56.188091 1 request.go:700] Waited for 1.19914254s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/namespaces?limit=500&resourceVersion=0 2026-02-17T15:08:56.191317833Z I0217 15:08:56.191186 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.205572574Z I0217 15:08:56.205445 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.289125455Z I0217 15:08:56.289006 1 shared_informer.go:320] Caches are synced for privileged-namespaces-psa-label-syncer 2026-02-17T15:08:56.298058655Z I0217 15:08:56.297950 1 base_controller.go:74] Caches are synced for namespace-security-allocation-controller 2026-02-17T15:08:56.298058655Z I0217 15:08:56.297986 1 base_controller.go:111] Starting #1 worker of namespace-security-allocation-controller controller ... 2026-02-17T15:08:56.298058655Z I0217 15:08:56.298036 1 namespace_scc_allocation_controller.go:111] Repairing SCC UID Allocations 2026-02-17T15:08:56.392193326Z I0217 15:08:56.392091 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.493569854Z I0217 15:08:56.493382 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.591103549Z I0217 15:08:56.590998 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.593816516Z I0217 15:08:56.593670 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.793616512Z I0217 15:08:56.791637 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.807984364Z I0217 15:08:56.807887 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.890691615Z I0217 15:08:56.890602 1 base_controller.go:74] Caches are synced for pod-security-admission-label-synchronization-controller 2026-02-17T15:08:56.890691615Z I0217 15:08:56.890637 1 base_controller.go:111] Starting #1 worker of pod-security-admission-label-synchronization-controller controller ... 2026-02-17T15:08:56.989128631Z I0217 15:08:56.989064 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:56.990071975Z I0217 15:08:56.990036 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:57.187219925Z I0217 15:08:57.187157 1 reflector.go:368] Caches populated for *v1.ResourceQuota from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:57.189639214Z I0217 15:08:57.189588 1 request.go:700] Waited for 2.199831529s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/cloudcredential.openshift.io/v1/credentialsrequests?limit=500&resourceVersion=0 2026-02-17T15:08:57.192159946Z I0217 15:08:57.192114 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:57.388515907Z I0217 15:08:57.388364 1 reflector.go:368] Caches populated for *v1.LimitRange from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:57.390177848Z I0217 15:08:57.390091 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:57.590516217Z I0217 15:08:57.590417 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:57.791436799Z I0217 15:08:57.791336 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:57.809669427Z I0217 15:08:57.809489 1 namespace_scc_allocation_controller.go:116] Repair complete 2026-02-17T15:08:57.991643575Z I0217 15:08:57.991594 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:58.190525657Z I0217 15:08:58.190481 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:58.310766430Z W0217 15:08:58.310535 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:08:58.310766430Z E0217 15:08:58.310598 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:08:58.389944734Z I0217 15:08:58.389874 1 request.go:700] Waited for 3.400021237s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/ipam.cluster.x-k8s.io/v1beta1/ipaddressclaims?limit=500&resourceVersion=0 2026-02-17T15:08:58.391549873Z I0217 15:08:58.391503 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:58.591762929Z I0217 15:08:58.591647 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:58.790930769Z I0217 15:08:58.790853 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:58.992152549Z I0217 15:08:58.992083 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:59.191846412Z I0217 15:08:59.191761 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:59.391635997Z I0217 15:08:59.391567 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:59.589872464Z I0217 15:08:59.589792 1 request.go:700] Waited for 4.599852585s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/infrastructure.cluster.x-k8s.io/v1beta1/metal3remediationtemplates?limit=500&resourceVersion=0 2026-02-17T15:08:59.592125069Z I0217 15:08:59.592067 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:59.791579827Z I0217 15:08:59.791509 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:08:59.991202257Z I0217 15:08:59.991107 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:00.191808503Z I0217 15:09:00.191712 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:00.391503605Z I0217 15:09:00.391197 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:00.591355182Z I0217 15:09:00.591250 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:00.790553213Z I0217 15:09:00.790098 1 request.go:700] Waited for 5.800058911s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/operator.openshift.io/v1/ingresscontrollers?limit=500&resourceVersion=0 2026-02-17T15:09:00.795483544Z I0217 15:09:00.792802 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:00.991820874Z I0217 15:09:00.991562 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:01.192534982Z I0217 15:09:01.191747 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:01.392321747Z I0217 15:09:01.392203 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:01.591499387Z I0217 15:09:01.591131 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:01.792174885Z I0217 15:09:01.792073 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:01.990060293Z I0217 15:09:01.989980 1 request.go:700] Waited for 6.9998942s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/servicemonitors?limit=500&resourceVersion=0 2026-02-17T15:09:01.993948499Z I0217 15:09:01.993879 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:02.191772875Z I0217 15:09:02.191705 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:02.393616411Z I0217 15:09:02.393314 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:02.591768036Z I0217 15:09:02.591699 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:02.791745296Z I0217 15:09:02.791656 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:02.990200078Z I0217 15:09:02.990073 1 request.go:700] Waited for 7.999949333s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/helm.openshift.io/v1beta1/projecthelmchartrepositories?limit=500&resourceVersion=0 2026-02-17T15:09:02.992475284Z I0217 15:09:02.992386 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:03.191045109Z I0217 15:09:03.190979 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:03.199444886Z W0217 15:09:03.199347 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:09:03.199444886Z E0217 15:09:03.199427 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:09:03.391766467Z I0217 15:09:03.390840 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:03.478267451Z I0217 15:09:03.478203 1 reconciliation_controller.go:149] Caches are synced 2026-02-17T15:09:03.490649725Z I0217 15:09:03.490605 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-17T15:09:14.907404066Z W0217 15:09:14.907291 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:09:14.907404066Z E0217 15:09:14.907333 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:09:33.503382079Z I0217 15:09:33.503197 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-17T15:09:33.503898742Z E0217 15:09:33.503384 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-17T15:09:34.177385647Z W0217 15:09:34.177279 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-17T15:09:34.177385647Z E0217 15:09:34.177366 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-17T15:09:34.505499253Z I0217 15:09:34.505349 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-02-17T15:09:36.064715974Z I0217 15:09:36.064640 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-02-17T15:09:37.029986383Z I0217 15:09:37.029865 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-02-17T15:09:38.228984830Z I0217 15:09:38.228880 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-02-17T15:09:38.330373589Z I0217 15:09:38.330305 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-02-17T15:09:41.316583465Z I0217 15:09:41.316492 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found kube-controller-manager_current.log0000640000000000000000000006320515145102315036024 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-02-17T15:09:40.353542072Z I0217 15:09:40.353227 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-cb4f7b4cf" duration="48.841µs" 2026-02-17T15:09:40.376033884Z I0217 15:09:40.375975 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96" duration="67.762µs" 2026-02-17T15:09:41.206645667Z I0217 15:09:41.206594 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84976bb859" duration="51.311µs" 2026-02-17T15:09:41.220720252Z I0217 15:09:41.220667 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-cb4f7b4cf" duration="51.731µs" 2026-02-17T15:09:41.225141410Z I0217 15:09:41.225103 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96" duration="54.971µs" 2026-02-17T15:09:41.435645679Z I0217 15:09:41.435558 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" need=1 creating=1 2026-02-17T15:09:41.447660624Z I0217 15:09:41.447591 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:41.463594205Z I0217 15:09:41.463526 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" duration="28.020898ms" 2026-02-17T15:09:41.476175273Z I0217 15:09:41.476122 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" duration="12.531208ms" 2026-02-17T15:09:41.476259686Z I0217 15:09:41.476238 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" duration="70.923µs" 2026-02-17T15:09:41.489787208Z I0217 15:09:41.489717 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" duration="65.042µs" 2026-02-17T15:09:41.493256994Z I0217 15:09:41.492874 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc" need=1 creating=1 2026-02-17T15:09:41.512246979Z I0217 15:09:41.512151 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:41.566656545Z I0217 15:09:41.566570 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc" duration="73.735711ms" 2026-02-17T15:09:41.570203653Z I0217 15:09:41.570126 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:41.576674121Z I0217 15:09:41.576582 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc" duration="9.966185ms" 2026-02-17T15:09:41.576770883Z I0217 15:09:41.576735 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc" duration="57.581µs" 2026-02-17T15:09:41.590914101Z I0217 15:09:41.590826 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc" duration="37.691µs" 2026-02-17T15:09:41.960764732Z I0217 15:09:41.960680 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-api/machine-api-operator-bd7dd5c46" need=1 creating=1 2026-02-17T15:09:41.984652638Z I0217 15:09:41.984601 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-api/machine-api-operator" err="Operation cannot be fulfilled on deployments.apps \"machine-api-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:42.001367429Z I0217 15:09:42.001293 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="41.138961ms" 2026-02-17T15:09:42.012824990Z I0217 15:09:42.012757 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="11.381489ms" 2026-02-17T15:09:42.026099025Z I0217 15:09:42.026036 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="13.224454ms" 2026-02-17T15:09:42.026143656Z I0217 15:09:42.026100 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="29.08µs" 2026-02-17T15:09:42.038419298Z I0217 15:09:42.038360 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="44.761µs" 2026-02-17T15:09:42.207513969Z I0217 15:09:42.206748 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d" duration="11.869441ms" 2026-02-17T15:09:42.207513969Z I0217 15:09:42.206832 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d" duration="37.151µs" 2026-02-17T15:09:42.213227119Z I0217 15:09:42.212646 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" duration="52.451µs" 2026-02-17T15:09:42.231184620Z I0217 15:09:42.230743 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84976bb859" duration="9.451032ms" 2026-02-17T15:09:42.231223021Z I0217 15:09:42.231179 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84976bb859" duration="122.043µs" 2026-02-17T15:09:43.215339274Z I0217 15:09:43.214978 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" duration="52.952µs" 2026-02-17T15:09:43.274886965Z I0217 15:09:43.249339 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" duration="12.011005ms" 2026-02-17T15:09:43.274886965Z I0217 15:09:43.249408 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-67d4dbd88b" duration="40.901µs" 2026-02-17T15:09:44.239045947Z I0217 15:09:44.238963 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-cb4f7b4cf" duration="12.040296ms" 2026-02-17T15:09:44.239097689Z I0217 15:09:44.239074 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-cb4f7b4cf" duration="62.621µs" 2026-02-17T15:09:47.533788559Z I0217 15:09:47.533175 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96" duration="86.992µs" 2026-02-17T15:09:47.554853996Z E0217 15:09:47.554706 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-02-17T15:09:47.653870747Z I0217 15:09:47.653745 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-17T15:09:48.327429674Z I0217 15:09:48.325579 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96" duration="17.752865ms" 2026-02-17T15:09:48.327429674Z I0217 15:09:48.325713 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96" duration="97.673µs" 2026-02-17T15:09:49.303366475Z I0217 15:09:49.297878 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc" duration="74.222µs" 2026-02-17T15:09:50.309902977Z I0217 15:09:50.309296 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc" duration="70.702µs" 2026-02-17T15:09:51.321225587Z I0217 15:09:51.321102 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc" duration="84.532µs" 2026-02-17T15:09:51.428779497Z I0217 15:09:51.428613 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-686c884b4d" need=1 creating=1 2026-02-17T15:09:51.445357965Z I0217 15:09:51.445193 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:51.456782015Z I0217 15:09:51.456676 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="28.11356ms" 2026-02-17T15:09:51.468336228Z I0217 15:09:51.468253 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="11.475021ms" 2026-02-17T15:09:51.468400910Z I0217 15:09:51.468356 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="49.461µs" 2026-02-17T15:09:51.485436588Z I0217 15:09:51.485341 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="59.431µs" 2026-02-17T15:09:51.495067385Z I0217 15:09:51.494975 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="79.662µs" 2026-02-17T15:09:52.260114338Z I0217 15:09:52.259219 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="66.642µs" 2026-02-17T15:09:52.647511429Z I0217 15:09:52.645078 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-864ddd5f56" duration="72.832µs" 2026-02-17T15:09:52.652248416Z I0217 15:09:52.650859 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-695b766898" duration="80.862µs" 2026-02-17T15:09:52.652248416Z I0217 15:09:52.651098 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7d8f4c8c66" duration="24.92µs" 2026-02-17T15:09:52.652248416Z I0217 15:09:52.651155 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" 2026-02-17T15:09:52.666567787Z I0217 15:09:52.665707 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7d8f4c8c66" duration="54.951µs" 2026-02-17T15:09:52.669182932Z I0217 15:09:52.669118 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-695b766898" duration="68.822µs" 2026-02-17T15:09:52.669856018Z I0217 15:09:52.669584 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" 2026-02-17T15:09:52.684446647Z I0217 15:09:52.681038 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-864ddd5f56" duration="60.391µs" 2026-02-17T15:09:52.700158672Z I0217 15:09:52.700084 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-695b766898" duration="68.622µs" 2026-02-17T15:09:52.721101666Z I0217 15:09:52.721028 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7d8f4c8c66" duration="40.841µs" 2026-02-17T15:09:52.738401601Z I0217 15:09:52.738323 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" 2026-02-17T15:09:53.366955193Z I0217 15:09:53.366875 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="10.848907ms" 2026-02-17T15:09:53.367036065Z I0217 15:09:53.366999 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="57.962µs" 2026-02-17T15:09:53.475684043Z I0217 15:09:53.475299 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7d8f4c8c66" duration="46.151µs" 2026-02-17T15:09:53.539701944Z I0217 15:09:53.539347 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-695b766898" duration="72.092µs" 2026-02-17T15:09:53.590894221Z I0217 15:09:53.590814 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" 2026-02-17T15:09:54.364087214Z I0217 15:09:54.364009 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7d8f4c8c66" duration="10.454946ms" 2026-02-17T15:09:54.364122465Z I0217 15:09:54.364094 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7d8f4c8c66" duration="44.101µs" 2026-02-17T15:09:54.377622887Z I0217 15:09:54.377521 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" 2026-02-17T15:09:55.291176805Z I0217 15:09:55.291098 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-6c46d95f74" need=0 deleting=1 2026-02-17T15:09:55.291176805Z I0217 15:09:55.291154 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-6c46d95f74" relatedReplicaSets=["openshift-cluster-machine-approver/machine-approver-6c46d95f74"] 2026-02-17T15:09:55.291238147Z I0217 15:09:55.291203 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="machine-approver-6c46d95f74" pod="openshift-cluster-machine-approver/machine-approver-6c46d95f74-nsmfx" 2026-02-17T15:09:55.309392453Z I0217 15:09:55.309305 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:55.310054439Z I0217 15:09:55.309967 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6c46d95f74" duration="18.916445ms" 2026-02-17T15:09:55.321399538Z I0217 15:09:55.321307 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6c46d95f74" duration="11.280667ms" 2026-02-17T15:09:55.321447939Z I0217 15:09:55.321422 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6c46d95f74" duration="56.781µs" 2026-02-17T15:09:55.323115280Z I0217 15:09:55.323046 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:55.358156070Z I0217 15:09:55.358076 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-695b766898" duration="78.282µs" 2026-02-17T15:09:55.392518164Z I0217 15:09:55.389526 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-695b766898" duration="8.53272ms" 2026-02-17T15:09:55.392518164Z I0217 15:09:55.389629 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-695b766898" duration="50.901µs" 2026-02-17T15:09:55.412805612Z I0217 15:09:55.412366 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" 2026-02-17T15:09:55.855844050Z I0217 15:09:55.855753 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-7485d645b8" need=1 creating=1 2026-02-17T15:09:55.874101318Z I0217 15:09:55.874026 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:55.900702841Z I0217 15:09:55.896090 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-7485d645b8" duration="40.438033ms" 2026-02-17T15:09:55.915146355Z I0217 15:09:55.915068 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-7485d645b8" duration="18.934895ms" 2026-02-17T15:09:55.915191936Z I0217 15:09:55.915142 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-7485d645b8" duration="35.071µs" 2026-02-17T15:09:55.932140472Z I0217 15:09:55.928770 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-7485d645b8" duration="95.102µs" 2026-02-17T15:09:56.382337376Z I0217 15:09:56.382158 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" 2026-02-17T15:09:56.407377671Z I0217 15:09:56.407316 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6c46d95f74" duration="64.411µs" 2026-02-17T15:09:56.417653433Z I0217 15:09:56.417589 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6c46d95f74" duration="207.605µs" 2026-02-17T15:09:56.419606560Z I0217 15:09:56.419573 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" 2026-02-17T15:09:56.421077196Z I0217 15:09:56.420492 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6c46d95f74" duration="53.512µs" 2026-02-17T15:09:56.430061578Z I0217 15:09:56.430008 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-8569dd85ff" need=1 creating=1 2026-02-17T15:09:56.445339523Z I0217 15:09:56.445281 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-8569dd85ff" duration="15.291895ms" 2026-02-17T15:09:56.445719512Z I0217 15:09:56.445668 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:56.459879819Z I0217 15:09:56.459783 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:09:56.465809935Z I0217 15:09:56.465664 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-8569dd85ff" duration="20.329109ms" 2026-02-17T15:09:56.465809935Z I0217 15:09:56.465746 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-8569dd85ff" duration="46.131µs" 2026-02-17T15:09:57.760641265Z I0217 15:09:57.759662 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29522340" delay="1s" config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011525515145102315031001 0ustar00000000000000002026-02-17T15:07:19.299716072Z }, 2026-02-17T15:07:19.299716072Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-17T15:07:19.299716072Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-17T15:07:19.299716072Z (string) (len=20) "aggregator-client-ca", 2026-02-17T15:07:19.299716072Z (string) (len=9) "client-ca" 2026-02-17T15:07:19.299716072Z }, 2026-02-17T15:07:19.299716072Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:07:19.299716072Z (string) (len=17) "trusted-ca-bundle" 2026-02-17T15:07:19.299716072Z }, 2026-02-17T15:07:19.299716072Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-02-17T15:07:19.299716072Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-17T15:07:19.299716072Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-17T15:07:19.299716072Z Timeout: (time.Duration) 2m0s, 2026-02-17T15:07:19.299716072Z StaticPodManifestsLockFile: (string) "", 2026-02-17T15:07:19.299716072Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-17T15:07:19.299716072Z KubeletVersion: (string) "" 2026-02-17T15:07:19.299716072Z }) 2026-02-17T15:07:19.300621545Z I0217 15:07:19.300571 1 cmd.go:413] Getting controller reference for node master-0 2026-02-17T15:07:19.398812515Z I0217 15:07:19.398676 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-17T15:07:19.398883956Z I0217 15:07:19.398811 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:07:19.398883956Z I0217 15:07:19.398853 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:07:19.402484266Z I0217 15:07:19.402362 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-17T15:07:49.403073682Z I0217 15:07:49.402946 1 cmd.go:524] Getting installer pods for node master-0 2026-02-17T15:07:49.488718551Z I0217 15:07:49.488560 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-02-17T15:07:49.488718551Z I0217 15:07:49.488618 1 cmd.go:431] Querying kubelet version for node master-0 2026-02-17T15:08:31.204245860Z I0217 15:08:31.204085 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-02-17T15:08:31.204245860Z I0217 15:08:31.204181 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-02-17T15:08:31.204412574Z I0217 15:08:31.204363 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-02-17T15:08:31.204412574Z I0217 15:08:31.204390 1 cmd.go:229] Getting secrets ... 2026-02-17T15:08:31.209357358Z I0217 15:08:31.209284 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2026-02-17T15:08:31.211796099Z I0217 15:08:31.211732 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2026-02-17T15:08:31.214876805Z I0217 15:08:31.214788 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2026-02-17T15:08:31.214876805Z I0217 15:08:31.214866 1 cmd.go:242] Getting config maps ... 2026-02-17T15:08:32.938866861Z I0217 15:08:32.938766 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2026-02-17T15:08:32.940888892Z I0217 15:08:32.940837 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2026-02-17T15:08:32.942478471Z I0217 15:08:32.942417 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2026-02-17T15:08:32.951908666Z I0217 15:08:32.951853 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2026-02-17T15:08:32.955056094Z I0217 15:08:32.955003 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2026-02-17T15:08:32.957542326Z I0217 15:08:32.957502 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2026-02-17T15:08:32.959162796Z I0217 15:08:32.959125 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2026-02-17T15:08:32.960811757Z I0217 15:08:32.960758 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2026-02-17T15:08:32.962307884Z I0217 15:08:32.962263 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2026-02-17T15:08:32.962339215Z I0217 15:08:32.962304 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2026-02-17T15:08:32.962652202Z I0217 15:08:32.962616 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2026-02-17T15:08:32.962965790Z I0217 15:08:32.962906 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2026-02-17T15:08:32.963186976Z I0217 15:08:32.963123 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2026-02-17T15:08:32.963433512Z I0217 15:08:32.963380 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2026-02-17T15:08:32.963610236Z I0217 15:08:32.963551 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2026-02-17T15:08:32.963842202Z I0217 15:08:32.963795 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2026-02-17T15:08:32.963974475Z I0217 15:08:32.963920 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2026-02-17T15:08:32.964192020Z I0217 15:08:32.964143 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2026-02-17T15:08:32.964389395Z I0217 15:08:32.964358 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2026-02-17T15:08:32.964644042Z I0217 15:08:32.964603 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2026-02-17T15:08:32.964873858Z I0217 15:08:32.964833 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2026-02-17T15:08:32.965009911Z I0217 15:08:32.964969 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2026-02-17T15:08:32.965229506Z I0217 15:08:32.965191 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2026-02-17T15:08:32.965357919Z I0217 15:08:32.965310 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2026-02-17T15:08:32.965641436Z I0217 15:08:32.965569 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2026-02-17T15:08:32.965769049Z I0217 15:08:32.965703 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2026-02-17T15:08:32.965982476Z I0217 15:08:32.965924 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2026-02-17T15:08:32.966103589Z I0217 15:08:32.966052 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2026-02-17T15:08:32.966294033Z I0217 15:08:32.966243 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2026-02-17T15:08:32.966536619Z I0217 15:08:32.966500 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2026-02-17T15:08:32.966777505Z I0217 15:08:32.966737 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2026-02-17T15:08:32.966976210Z I0217 15:08:32.966935 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2026-02-17T15:08:32.967214425Z I0217 15:08:32.967161 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2026-02-17T15:08:32.967370340Z I0217 15:08:32.967329 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2026-02-17T15:08:32.967647317Z I0217 15:08:32.967591 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2026-02-17T15:08:32.987362497Z I0217 15:08:32.967733 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-02-17T15:08:32.987362497Z I0217 15:08:32.967982 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2026-02-17T15:08:32.987362497Z I0217 15:08:32.968096 1 cmd.go:229] Getting secrets ... 2026-02-17T15:08:32.987362497Z I0217 15:08:32.969927 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2026-02-17T15:08:32.988007762Z I0217 15:08:32.987950 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2026-02-17T15:08:32.988007762Z I0217 15:08:32.987996 1 cmd.go:242] Getting config maps ... 2026-02-17T15:08:33.144182713Z I0217 15:08:33.144098 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2026-02-17T15:08:33.343612028Z I0217 15:08:33.343514 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2026-02-17T15:08:33.553662937Z I0217 15:08:33.553531 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2026-02-17T15:08:33.554317584Z I0217 15:08:33.554260 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2026-02-17T15:08:33.554641502Z I0217 15:08:33.554587 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2026-02-17T15:08:33.554873477Z I0217 15:08:33.554821 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2026-02-17T15:08:33.555047522Z I0217 15:08:33.554999 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2026-02-17T15:08:33.555152134Z I0217 15:08:33.555106 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2026-02-17T15:08:33.555331018Z I0217 15:08:33.555285 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2026-02-17T15:08:33.555568975Z I0217 15:08:33.555520 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2026-02-17T15:08:33.555731949Z I0217 15:08:33.555696 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2026-02-17T15:08:33.555912903Z I0217 15:08:33.555877 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2026-02-17T15:08:33.556011996Z I0217 15:08:33.555978 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2026-02-17T15:08:33.556219411Z I0217 15:08:33.556185 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2026-02-17T15:08:33.556382995Z I0217 15:08:33.556348 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2026-02-17T15:08:33.557228736Z I0217 15:08:33.557176 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2026-02-17T15:08:33.743690659Z I0217 15:08:33.743578 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-02-17T15:08:33.743690659Z I0217 15:08:33.743655 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2026-02-17T15:08:33.743690659Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-2clbh --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-17T15:08:33.791110618Z I0217 15:08:33.791015 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2026-02-17T15:08:33.791452116Z I0217 15:08:33.791366 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-02-17T15:08:33.791452116Z I0217 15:08:33.791390 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-02-17T15:08:33.791452116Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-2clbh --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-17T15:08:47.939763714Z W0217 15:08:47.939486 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-2-master-0.1895112d16a9fa04.a21802ec openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-kube-controller-manager,Name:installer-2-master-0,UID:d5655115-c223-42ed-a93d-9d609e55c901,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 2,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-02-17 15:08:33.79159706 +0000 UTC m=+74.982674563,LastTimestamp:2026-02-17 15:08:33.79159706 +0000 UTC m=+74.982674563,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/events?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715145102315027200 0ustar00000000000000002026-02-17T15:03:37.900516254Z I0217 15:03:37.894367 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000b7da40 cert-dir:0xc000b7dc20 cert-secrets:0xc000b7d9a0 configmaps:0xc000b7d540 namespace:0xc000b7d360 optional-cert-configmaps:0xc000b7db80 optional-cert-secrets:0xc000b7dae0 optional-configmaps:0xc000b7d680 optional-secrets:0xc000b7d5e0 pod:0xc000b7d400 pod-manifest-dir:0xc000b7d7c0 resource-dir:0xc000b7d720 revision:0xc000b7d2c0 secrets:0xc000b7d4a0 v:0xc00057f2c0] [0xc00057f2c0 0xc000b7d2c0 0xc000b7d360 0xc000b7d400 0xc000b7d720 0xc000b7d7c0 0xc000b7d540 0xc000b7d680 0xc000b7d4a0 0xc000b7d5e0 0xc000b7dc20 0xc000b7da40 0xc000b7db80 0xc000b7d9a0 0xc000b7dae0] [] map[cert-configmaps:0xc000b7da40 cert-dir:0xc000b7dc20 cert-secrets:0xc000b7d9a0 configmaps:0xc000b7d540 help:0xc00057f680 kubeconfig:0xc000b7d220 log-flush-frequency:0xc00057f220 namespace:0xc000b7d360 optional-cert-configmaps:0xc000b7db80 optional-cert-secrets:0xc000b7dae0 optional-configmaps:0xc000b7d680 optional-secrets:0xc000b7d5e0 pod:0xc000b7d400 pod-manifest-dir:0xc000b7d7c0 pod-manifests-lock-file:0xc000b7d900 resource-dir:0xc000b7d720 revision:0xc000b7d2c0 secrets:0xc000b7d4a0 timeout-duration:0xc000b7d860 v:0xc00057f2c0 vmodule:0xc00057f360] [0xc000b7d220 0xc000b7d2c0 0xc000b7d360 0xc000b7d400 0xc000b7d4a0 0xc000b7d540 0xc000b7d5e0 0xc000b7d680 0xc000b7d720 0xc000b7d7c0 0xc000b7d860 0xc000b7d900 0xc000b7d9a0 0xc000b7da40 0xc000b7dae0 0xc000b7db80 0xc000b7dc20 0xc00057f220 0xc00057f2c0 0xc00057f360 0xc00057f680] [0xc000b7da40 0xc000b7dc20 0xc000b7d9a0 0xc000b7d540 0xc00057f680 0xc000b7d220 0xc00057f220 0xc000b7d360 0xc000b7db80 0xc000b7dae0 0xc000b7d680 0xc000b7d5e0 0xc000b7d400 0xc000b7d7c0 0xc000b7d900 0xc000b7d720 0xc000b7d2c0 0xc000b7d4a0 0xc000b7d860 0xc00057f2c0 0xc00057f360] map[104:0xc00057f680 118:0xc00057f2c0] [] -1 0 0xc00021c870 true 0xae1c20 []} 2026-02-17T15:03:37.900516254Z I0217 15:03:37.895197 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0005389c0)({ 2026-02-17T15:03:37.900516254Z KubeConfig: (string) "", 2026-02-17T15:03:37.900516254Z KubeClient: (kubernetes.Interface) , 2026-02-17T15:03:37.900516254Z Revision: (string) (len=1) "1", 2026-02-17T15:03:37.900516254Z NodeName: (string) "", 2026-02-17T15:03:37.900516254Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-17T15:03:37.900516254Z Clock: (clock.RealClock) { 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-17T15:03:37.900516254Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-17T15:03:37.900516254Z (string) (len=11) "etcd-client", 2026-02-17T15:03:37.900516254Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=31) "localhost-recovery-client-token" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-17T15:03:37.900516254Z (string) (len=17) "encryption-config", 2026-02-17T15:03:37.900516254Z (string) (len=21) "webhook-authenticator" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-17T15:03:37.900516254Z (string) (len=18) "kube-apiserver-pod", 2026-02-17T15:03:37.900516254Z (string) (len=6) "config", 2026-02-17T15:03:37.900516254Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-17T15:03:37.900516254Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-17T15:03:37.900516254Z (string) (len=15) "etcd-serving-ca", 2026-02-17T15:03:37.900516254Z (string) (len=18) "kubelet-serving-ca", 2026-02-17T15:03:37.900516254Z (string) (len=22) "sa-token-signing-certs", 2026-02-17T15:03:37.900516254Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-17T15:03:37.900516254Z (string) (len=14) "oauth-metadata", 2026-02-17T15:03:37.900516254Z (string) (len=12) "cloud-config", 2026-02-17T15:03:37.900516254Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-17T15:03:37.900516254Z (string) (len=17) "aggregator-client", 2026-02-17T15:03:37.900516254Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=31) "service-network-serving-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=33) "bound-service-account-signing-key", 2026-02-17T15:03:37.900516254Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-17T15:03:37.900516254Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-17T15:03:37.900516254Z (string) (len=14) "kubelet-client", 2026-02-17T15:03:37.900516254Z (string) (len=16) "node-kubeconfigs" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-17T15:03:37.900516254Z (string) (len=17) "user-serving-cert", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-000", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-001", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-002", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-003", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-004", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-005", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-006", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-007", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-008", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-009" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-17T15:03:37.900516254Z (string) (len=20) "aggregator-client-ca", 2026-02-17T15:03:37.900516254Z (string) (len=9) "client-ca", 2026-02-17T15:03:37.900516254Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-17T15:03:37.900516254Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:03:37.900516254Z (string) (len=17) "trusted-ca-bundle" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-17T15:03:37.900516254Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-17T15:03:37.900516254Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-17T15:03:37.900516254Z Timeout: (time.Duration) 2m0s, 2026-02-17T15:03:37.900516254Z StaticPodManifestsLockFile: (string) "", 2026-02-17T15:03:37.900516254Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-17T15:03:37.900516254Z KubeletVersion: (string) "" 2026-02-17T15:03:37.900516254Z }) 2026-02-17T15:03:37.905240787Z I0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0 2026-02-17T15:03:37.916575058Z I0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-17T15:03:37.916575058Z I0217 15:03:37.913332 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:03:37.916575058Z I0217 15:03:37.913342 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:03:37.925511143Z I0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-17T15:04:07.924825275Z I0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0 2026-02-17T15:04:21.928602000Z F0217 15:04:21.928422 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115145102315022660 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"580b240a-a806-454d-ab19-8f193a8d9ca2","resourceVersion":"8459","creationTimestamp":"2026-02-17T15:03:35Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"9dc33f9e-930a-4edc-80fd-16c00958a166"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:25Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:35Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:24Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:24Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-02-17T15:03:35Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0\nI0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0217 15:03:37.913332 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:03:37.913342 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0\nF0217 15:04:21.928422 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-17T15:03:37Z","finishedAt":"2026-02-17T15:04:23Z","containerID":"cri-o://dcdeeb6985f895a6d59b345be94e95ea3c9c558f1f7b7901594a31fa91429102"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://dcdeeb6985f895a6d59b345be94e95ea3c9c558f1f7b7901594a31fa91429102","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615145102315035760 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-17T15:00:24.481812719Z I0217 15:00:24.481525 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010565215145102315032661 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-17T15:09:51.182686265Z I0217 15:09:51.182623 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.184254494Z I0217 15:09:51.184179 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from runtime/asm_amd64.s:1695 2026-02-17T15:09:51.185669108Z I0217 15:09:51.185598 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.348224749Z I0217 15:09:51.347922 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.382924461Z I0217 15:09:51.382825 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.386716555Z I0217 15:09:51.386654 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.548260761Z I0217 15:09:51.548180 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.582751958Z I0217 15:09:51.582680 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.585415143Z I0217 15:09:51.585359 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.748740563Z I0217 15:09:51.748605 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.782690887Z I0217 15:09:51.782567 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.786539421Z I0217 15:09:51.786409 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.948758504Z I0217 15:09:51.948693 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.982355118Z I0217 15:09:51.982248 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:51.986194273Z I0217 15:09:51.986123 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.148495068Z I0217 15:09:52.148406 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.182250156Z I0217 15:09:52.182171 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.186306236Z I0217 15:09:52.186237 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.190901499Z I0217 15:09:52.190840 1 policy_source.go:224] refreshing policies 2026-02-17T15:09:52.347981185Z I0217 15:09:52.347890 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.383281761Z I0217 15:09:52.383167 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.386406779Z I0217 15:09:52.386335 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.547974605Z I0217 15:09:52.547852 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.582960024Z I0217 15:09:52.582871 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.587032624Z I0217 15:09:52.586951 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.747712820Z I0217 15:09:52.747631 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.759801766Z E0217 15:09:52.759709 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.759801766Z E0217 15:09:52.759759 1 remote_available_controller.go:470] "Unhandled Error" err="v1.project.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.759901368Z E0217 15:09:52.759854 1 remote_available_controller.go:470] "Unhandled Error" err="v1.template.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.759918269Z E0217 15:09:52.759904 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.760021692Z E0217 15:09:52.759987 1 remote_available_controller.go:470] "Unhandled Error" err="v1.quota.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.762367829Z E0217 15:09:52.762282 1 remote_available_controller.go:470] "Unhandled Error" err="v1.security.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.769870754Z E0217 15:09:52.769106 1 remote_available_controller.go:470] "Unhandled Error" err="v1.user.openshift.io failed with: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.769870754Z E0217 15:09:52.769159 1 remote_available_controller.go:470] "Unhandled Error" err="v1.oauth.openshift.io failed with: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.775521523Z E0217 15:09:52.771211 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.775521523Z E0217 15:09:52.771272 1 remote_available_controller.go:470] "Unhandled Error" err="v1.image.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.775521523Z E0217 15:09:52.771283 1 remote_available_controller.go:470] "Unhandled Error" err="v1.route.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.775521523Z E0217 15:09:52.773147 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-02-17T15:09:52.784489462Z I0217 15:09:52.784409 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.786567964Z I0217 15:09:52.786514 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.830729348Z I0217 15:09:52.830616 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=9 seatDemandAvg=0.0402744801133101 seatDemandStdev=0.37434764529464054 seatDemandSmoothed=21.941614150298495 fairFrac=2.331974373907979 currentCL=9 concurrencyDenominator=9 backstop=false 2026-02-17T15:09:52.948280004Z I0217 15:09:52.948182 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.983443107Z I0217 15:09:52.983319 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:52.985748134Z I0217 15:09:52.985674 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.149247248Z I0217 15:09:53.149144 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.181942731Z I0217 15:09:53.181875 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.186087292Z I0217 15:09:53.185309 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.348588642Z I0217 15:09:53.348521 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.382749160Z I0217 15:09:53.382688 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.385419606Z I0217 15:09:53.385376 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.548510661Z I0217 15:09:53.548415 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.582250059Z I0217 15:09:53.582173 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.586934024Z I0217 15:09:53.586874 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.590854020Z E0217 15:09:53.590047 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-02-17T15:09:53.748441298Z I0217 15:09:53.748370 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.781854309Z I0217 15:09:53.781756 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.785828477Z I0217 15:09:53.785751 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.947867225Z I0217 15:09:53.947802 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.982593388Z I0217 15:09:53.982509 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:53.986213546Z I0217 15:09:53.986162 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.147544028Z I0217 15:09:54.147442 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.182747422Z I0217 15:09:54.182683 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.185573142Z I0217 15:09:54.185532 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.348953062Z I0217 15:09:54.348870 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.382713631Z I0217 15:09:54.382626 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.386880983Z I0217 15:09:54.386818 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.551533196Z I0217 15:09:54.548145 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.581910492Z I0217 15:09:54.581820 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.586089945Z I0217 15:09:54.586034 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.750544612Z I0217 15:09:54.750450 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.782554058Z I0217 15:09:54.782487 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.786615378Z I0217 15:09:54.786522 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.816392149Z E0217 15:09:54.816328 1 remote_available_controller.go:470] "Unhandled Error" err="v1.security.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:54.948050041Z I0217 15:09:54.947972 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.982031346Z I0217 15:09:54.981956 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:54.986499556Z I0217 15:09:54.986424 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.036745389Z E0217 15:09:55.036657 1 remote_available_controller.go:470] "Unhandled Error" err="v1.template.openshift.io failed with: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401" logger="UnhandledError" 2026-02-17T15:09:55.148146924Z I0217 15:09:55.148095 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.184634820Z I0217 15:09:55.182529 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.185421649Z I0217 15:09:55.185391 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.348161635Z I0217 15:09:55.348090 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.382191410Z I0217 15:09:55.382109 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.387094451Z I0217 15:09:55.387043 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.548038862Z I0217 15:09:55.547960 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.582439686Z I0217 15:09:55.582362 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.585882492Z I0217 15:09:55.585837 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.748037933Z I0217 15:09:55.747949 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.786278431Z I0217 15:09:55.786190 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.950313149Z I0217 15:09:55.950261 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:55.986248831Z I0217 15:09:55.986160 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:56.148297490Z I0217 15:09:56.148203 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:56.186559649Z I0217 15:09:56.186447 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:56.350544075Z I0217 15:09:56.347374 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:56.386377065Z I0217 15:09:56.386303 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:56.586191950Z I0217 15:09:56.586069 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:56.786002916Z I0217 15:09:56.785925 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:56.985907685Z I0217 15:09:56.985784 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:57.185806553Z I0217 15:09:57.185734 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:57.385900674Z I0217 15:09:57.385816 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:09:57.585770032Z I0217 15:09:57.585698 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015145102315031140 0ustar00000000000000002026-02-17T15:00:20.187530847Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115145102315036741 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-54984b6678-p5mdv2026-02-17T15:09:13.778504529Z I0217 15:09:13.778202 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:09:13.778504529Z I0217 15:09:13.778380 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:09:13.779156646Z I0217 15:09:13.779097 1 observer_polling.go:159] Starting file observer 2026-02-17T15:09:13.800868678Z I0217 15:09:13.800723 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-17T15:09:14.117092122Z I0217 15:09:14.117017 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:09:14.117212055Z W0217 15:09:14.117187 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:14.117265617Z W0217 15:09:14.117245 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:09:14.117316808Z W0217 15:09:14.117297 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:09:14.117365419Z W0217 15:09:14.117346 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:09:14.117522184Z W0217 15:09:14.117447 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:09:14.117594355Z W0217 15:09:14.117571 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:09:14.120875746Z I0217 15:09:14.120796 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-17T15:09:14.121088441Z I0217 15:09:14.121052 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-02-17T15:09:14.123507180Z I0217 15:09:14.122506 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:09:14.123507180Z I0217 15:09:14.122538 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:09:14.123507180Z I0217 15:09:14.122577 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:09:14.123507180Z I0217 15:09:14.122590 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:14.123507180Z I0217 15:09:14.122613 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:09:14.123507180Z I0217 15:09:14.122619 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:14.123507180Z I0217 15:09:14.123090 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:09:14.123554951Z I0217 15:09:14.123535 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-17T15:09:14.123640904Z I0217 15:09:14.123595 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:09:14.222964762Z I0217 15:09:14.222841 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:09:14.222964762Z I0217 15:09:14.222913 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:09:14.222964762Z I0217 15:09:14.222936 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController kube-apiserver-operator_previous.log0000640000000000000000000000243415145102315037140 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-54984b6678-p5mdv2026-02-17T15:07:18.125255950Z I0217 15:07:18.125070 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:07:18.125255950Z I0217 15:07:18.125188 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:07:18.125734852Z I0217 15:07:18.125681 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.305777237Z W0217 15:08:18.305641 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-apiserver-operator-54984b6678) 2026-02-17T15:08:18.305989873Z I0217 15:08:18.305929 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-17T15:08:48.687734818Z F0217 15:08:48.687655 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock": context deadline exceeded config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json0000640000000000000000000001601515145102315027732 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-54984b6678-p5mdv","generateName":"kube-apiserver-operator-54984b6678-","namespace":"openshift-kube-apiserver-operator","uid":"e259b5a1-837b-4cde-85f7-cd5781af08bd","resourceVersion":"9506","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"54984b6678"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-54984b6678","uid":"5c5a86e1-eff8-4f41-8119-d2cc362b753a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:13Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:13Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-02-17T15:09:13Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.125070 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.125188 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.125681 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.305641 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-apiserver-operator-54984b6678)\nI0217 15:08:18.305929 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af\nF0217 15:08:48.687655 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:18Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://c37b7a8b6b89d90619e0434b3f19d1c552551ee3029bb3ef42107c3c450c9cb1"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://0b8262975cf51c409ae05462f6db811ce0d8908ad2a83500403ab60076ef6470","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007240215145102315025174 0ustar00000000000000002026-02-17T15:03:54.725165056Z set -euo pipefail 2026-02-17T15:03:54.725165056Z 2026-02-17T15:03:54.725165056Z cluster-etcd-operator rev \ 2026-02-17T15:03:54.725165056Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-02-17T15:03:54.725165056Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-02-17T15:03:54.725165056Z --client-key-file=$(ETCDCTL_KEY) \ 2026-02-17T15:03:54.725165056Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-02-17T15:03:54.725165056Z securityContext: 2026-02-17T15:03:54.725165056Z privileged: true 2026-02-17T15:03:54.725165056Z resources: 2026-02-17T15:03:54.725165056Z requests: 2026-02-17T15:03:54.725165056Z memory: 50Mi 2026-02-17T15:03:54.725165056Z cpu: 10m 2026-02-17T15:03:54.725165056Z env: 2026-02-17T15:03:54.725165056Z - name: "ALL_ETCD_ENDPOINTS" 2026-02-17T15:03:54.725165056Z value: "https://192.168.32.10:2379" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_API" 2026-02-17T15:03:54.725165056Z value: "3" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_CACERT" 2026-02-17T15:03:54.725165056Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_CERT" 2026-02-17T15:03:54.725165056Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_ENDPOINTS" 2026-02-17T15:03:54.725165056Z value: "https://192.168.32.10:2379" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_KEY" 2026-02-17T15:03:54.725165056Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-02-17T15:03:54.725165056Z - name: "ETCD_CIPHER_SUITES" 2026-02-17T15:03:54.725165056Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-02-17T15:03:54.725165056Z - name: "ETCD_DATA_DIR" 2026-02-17T15:03:54.725165056Z value: "/var/lib/etcd" 2026-02-17T15:03:54.725165056Z - name: "ETCD_ELECTION_TIMEOUT" 2026-02-17T15:03:54.725165056Z value: "2500" 2026-02-17T15:03:54.725165056Z - name: "ETCD_ENABLE_PPROF" 2026-02-17T15:03:54.725265478Z value: "true" 2026-02-17T15:03:54.725265478Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-02-17T15:03:54.725265478Z value: "1" 2026-02-17T15:03:54.725265478Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-02-17T15:03:54.725265478Z value: "200ms" 2026-02-17T15:03:54.725265478Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-02-17T15:03:54.725265478Z value: "5s" 2026-02-17T15:03:54.725265478Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-02-17T15:03:54.725265478Z value: "500" 2026-02-17T15:03:54.725265478Z - name: "ETCD_IMAGE" 2026-02-17T15:03:54.725265478Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3" 2026-02-17T15:03:54.725265478Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-02-17T15:03:54.725265478Z value: "existing" 2026-02-17T15:03:54.725265478Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-02-17T15:03:54.725265478Z value: "8589934592" 2026-02-17T15:03:54.725265478Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-02-17T15:03:54.725265478Z value: "true" 2026-02-17T15:03:54.725265478Z - name: "ETCD_TLS_MIN_VERSION" 2026-02-17T15:03:54.725265478Z value: "TLS1.2" 2026-02-17T15:03:54.725265478Z - name: "NODE_master_0_ETCD_NAME" 2026-02-17T15:03:54.725265478Z value: "master-0" 2026-02-17T15:03:54.725265478Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-02-17T15:03:54.725265478Z value: "192.168.32.10" 2026-02-17T15:03:54.725265478Z - name: "NODE_master_0_IP" 2026-02-17T15:03:54.725265478Z value: "192.168.32.10" 2026-02-17T15:03:54.725265478Z volumeMounts: 2026-02-17T15:03:54.725265478Z - mountPath: /var/lib/etcd 2026-02-17T15:03:54.725265478Z name: data-dir 2026-02-17T15:03:54.725265478Z - mountPath: /etc/kubernetes/static-pod-certs 2026-02-17T15:03:54.725265478Z name: cert-dir 2026-02-17T15:03:54.725265478Z hostNetwork: true 2026-02-17T15:03:54.725265478Z priorityClassName: system-node-critical 2026-02-17T15:03:54.725265478Z tolerations: 2026-02-17T15:03:54.725265478Z - operator: "Exists" 2026-02-17T15:03:54.725265478Z volumes: 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /etc/kubernetes/manifests 2026-02-17T15:03:54.725265478Z name: static-pod-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-02-17T15:03:54.725265478Z name: resource-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-02-17T15:03:54.725265478Z name: cert-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /var/lib/etcd 2026-02-17T15:03:54.725265478Z type: "" 2026-02-17T15:03:54.725265478Z name: data-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /usr/local/bin 2026-02-17T15:03:54.725265478Z name: usr-local-bin 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /var/log/etcd 2026-02-17T15:03:54.725265478Z name: log-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /etc/kubernetes 2026-02-17T15:03:54.725265478Z name: config-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /var/lib/etcd-auto-backup 2026-02-17T15:03:54.725265478Z name: etcd-auto-backup-dir 2026-02-17T15:03:54.739481389Z I0217 15:03:54.739098 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-02-17T15:03:54.739481389Z I0217 15:03:54.739381 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-17T15:03:54.739481389Z I0217 15:03:54.739391 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-17T15:03:54.739481389Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615145102315023471 0ustar00000000000000002026-02-17T15:07:08.062708092Z I0217 15:07:08.062263 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215145102315024166 0ustar00000000000000002026-02-17T15:06:57.781328835Z I0217 15:06:57.781007 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-02-17T15:07:07.812291471Z I0217 15:07:07.812182 1 etcdcli_pool.go:70] creating a new cached client 2026-02-17T15:07:22.811190293Z I0217 15:07:22.811063 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615145102315024345 0ustar00000000000000002026-02-17T15:06:57.449330756Z {"level":"info","ts":"2026-02-17T15:06:57.449091Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-17T15:06:57.449842509Z {"level":"info","ts":"2026-02-17T15:06:57.449804Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-02-17T15:06:57.450042284Z {"level":"info","ts":"2026-02-17T15:06:57.450003Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-17T15:06:57.450159297Z {"level":"info","ts":"2026-02-17T15:06:57.450107Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-02-17T15:06:57.450187577Z {"level":"info","ts":"2026-02-17T15:06:57.450165Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc00017c000/192.168.32.10:9978\""} 2026-02-17T15:06:57.450238278Z {"level":"info","ts":"2026-02-17T15:06:57.450195Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc00017c000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-02-17T15:06:57.450238278Z {"level":"info","ts":"2026-02-17T15:06:57.450228Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-02-17T15:06:57.450561166Z {"level":"info","ts":"2026-02-17T15:06:57.450522Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-02-17T15:06:57.450626968Z {"level":"info","ts":"2026-02-17T15:06:57.450581Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-02-17T15:06:57.450731120Z {"level":"info","ts":"2026-02-17T15:06:57.450656Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000408dc0 } }"} 2026-02-17T15:06:57.451440828Z {"level":"info","ts":"2026-02-17T15:06:57.450868Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-02-17T15:06:57.451768516Z {"level":"info","ts":"2026-02-17T15:06:57.451697Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:06:57.452424282Z {"level":"info","ts":"2026-02-17T15:06:57.452347Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-02-17T15:06:57.452424282Z {"level":"info","ts":"2026-02-17T15:06:57.452418Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-02-17T15:06:57.452482385Z {"level":"info","ts":"2026-02-17T15:06:57.452440Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:06:57.452571137Z {"level":"info","ts":"2026-02-17T15:06:57.452416Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:06:57.453312435Z {"level":"info","ts":"2026-02-17T15:06:57.453226Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:57.453388166Z {"level":"warn","ts":"2026-02-17T15:06:57.453318Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:57.453445098Z {"level":"info","ts":"2026-02-17T15:06:57.453406Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:57.453548750Z {"level":"info","ts":"2026-02-17T15:06:57.453513Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, TRANSIENT_FAILURE"} 2026-02-17T15:06:57.453591981Z {"level":"info","ts":"2026-02-17T15:06:57.453490Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-02-17T15:06:57.453727015Z {"level":"info","ts":"2026-02-17T15:06:57.453557Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-02-17T15:06:57.453727015Z {"level":"info","ts":"2026-02-17T15:06:57.453689Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-02-17T15:06:57.453949401Z {"level":"info","ts":"2026-02-17T15:06:57.453912Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-02-17T15:06:57.453949401Z {"level":"info","ts":"2026-02-17T15:06:57.453940Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-02-17T15:06:57.453957331Z {"level":"info","ts":"2026-02-17T15:06:57.453947Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-02-17T15:06:57.453996632Z {"level":"info","ts":"2026-02-17T15:06:57.453956Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-02-17T15:06:57.454253198Z {"level":"info","ts":"2026-02-17T15:06:57.454218Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-02-17T15:06:58.454145183Z {"level":"info","ts":"2026-02-17T15:06:58.454010Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:58.454145183Z {"level":"info","ts":"2026-02-17T15:06:58.454089Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, IDLE"} 2026-02-17T15:06:58.454223885Z {"level":"info","ts":"2026-02-17T15:06:58.454152Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:06:58.454223885Z {"level":"info","ts":"2026-02-17T15:06:58.454201Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:06:58.454435560Z {"level":"info","ts":"2026-02-17T15:06:58.454347Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:06:58.454693477Z {"level":"info","ts":"2026-02-17T15:06:58.454608Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:58.454693477Z {"level":"warn","ts":"2026-02-17T15:06:58.454661Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:58.454768518Z {"level":"info","ts":"2026-02-17T15:06:58.454700Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:58.454768518Z {"level":"info","ts":"2026-02-17T15:06:58.454739Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, TRANSIENT_FAILURE"} 2026-02-17T15:07:00.129693477Z {"level":"info","ts":"2026-02-17T15:07:00.129549Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:00.129693477Z {"level":"info","ts":"2026-02-17T15:07:00.129628Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, IDLE"} 2026-02-17T15:07:00.129805670Z {"level":"info","ts":"2026-02-17T15:07:00.129668Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:07:00.129805670Z {"level":"info","ts":"2026-02-17T15:07:00.129710Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:07:00.129950743Z {"level":"info","ts":"2026-02-17T15:07:00.129872Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:07:00.130199849Z {"level":"info","ts":"2026-02-17T15:07:00.130112Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:00.130199849Z {"level":"warn","ts":"2026-02-17T15:07:00.130182Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:00.130243880Z {"level":"info","ts":"2026-02-17T15:07:00.130226Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:00.130308552Z {"level":"info","ts":"2026-02-17T15:07:00.130270Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, TRANSIENT_FAILURE"} 2026-02-17T15:07:02.883341597Z {"level":"info","ts":"2026-02-17T15:07:02.883206Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:02.883341597Z {"level":"info","ts":"2026-02-17T15:07:02.883276Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, IDLE"} 2026-02-17T15:07:02.883403558Z {"level":"info","ts":"2026-02-17T15:07:02.883312Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:07:02.883403558Z {"level":"info","ts":"2026-02-17T15:07:02.883351Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:07:02.883603263Z {"level":"info","ts":"2026-02-17T15:07:02.883509Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:07:02.883881381Z {"level":"info","ts":"2026-02-17T15:07:02.883792Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:02.883881381Z {"level":"warn","ts":"2026-02-17T15:07:02.883861Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:02.883960523Z {"level":"info","ts":"2026-02-17T15:07:02.883907Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:02.883978003Z {"level":"info","ts":"2026-02-17T15:07:02.883958Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, TRANSIENT_FAILURE"} 2026-02-17T15:07:06.447643262Z {"level":"info","ts":"2026-02-17T15:07:06.447528Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:06.447643262Z {"level":"info","ts":"2026-02-17T15:07:06.447586Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, IDLE"} 2026-02-17T15:07:06.447719274Z {"level":"info","ts":"2026-02-17T15:07:06.447628Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:07:06.447719274Z {"level":"info","ts":"2026-02-17T15:07:06.447664Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:07:06.447889918Z {"level":"info","ts":"2026-02-17T15:07:06.447801Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:07:06.455922648Z {"level":"info","ts":"2026-02-17T15:07:06.455841Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-02-17T15:07:06.455969689Z {"level":"info","ts":"2026-02-17T15:07:06.455886Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, READY"} 2026-02-17T15:07:06.456018480Z {"level":"info","ts":"2026-02-17T15:07:06.455987Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-02-17T15:07:06.456036131Z {"level":"info","ts":"2026-02-17T15:07:06.456018Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013756415145102315022715 0ustar00000000000000002026-02-17T15:09:23.754235501Z {"level":"warn","ts":"2026-02-17T15:09:23.754215Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.825037Z","time spent":"929.166932ms","remote":"[::1]:51526","response type":"/etcdserverpb.KV/Range","request count":0,"request size":127,"response count":1,"response size":2779,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-aws\" "} 2026-02-17T15:09:23.754391735Z {"level":"warn","ts":"2026-02-17T15:09:23.752806Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.828817Z","time spent":"923.981096ms","remote":"[::1]:37490","response type":"/etcdserverpb.KV/Range","request count":0,"request size":107,"response count":1,"response size":10931,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clusterautoscalers.autoscaling.openshift.io\" "} 2026-02-17T15:09:23.754450096Z {"level":"warn","ts":"2026-02-17T15:09:23.754406Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"925.653457ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-service-ca-operator/prometheus-k8s\" ","response":"range_response_count:1 size:1172"} 2026-02-17T15:09:23.754507297Z {"level":"info","ts":"2026-02-17T15:09:23.754443Z","caller":"traceutil/trace.go:171","msg":"trace[1932988330] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-service-ca-operator/prometheus-k8s; range_end:; response_count:1; response_revision:9705; }","duration":"925.698898ms","start":"2026-02-17T15:09:22.828733Z","end":"2026-02-17T15:09:23.754432Z","steps":["trace[1932988330] 'agreement among raft nodes before linearized reading' (duration: 925.626436ms)"],"step_count":1} 2026-02-17T15:09:23.754530388Z {"level":"warn","ts":"2026-02-17T15:09:23.754482Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.828728Z","time spent":"925.747729ms","remote":"[::1]:37506","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":1196,"request content":"key:\"/kubernetes.io/rolebindings/openshift-service-ca-operator/prometheus-k8s\" "} 2026-02-17T15:09:23.754705393Z {"level":"warn","ts":"2026-02-17T15:09:23.754652Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"925.857952ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-cluster-storage-operator/prometheus\" ","response":"range_response_count:1 size:1247"} 2026-02-17T15:09:23.754726384Z {"level":"info","ts":"2026-02-17T15:09:23.754696Z","caller":"traceutil/trace.go:171","msg":"trace[946810297] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cluster-storage-operator/prometheus; range_end:; response_count:1; response_revision:9705; }","duration":"925.918894ms","start":"2026-02-17T15:09:22.828765Z","end":"2026-02-17T15:09:23.754684Z","steps":["trace[946810297] 'agreement among raft nodes before linearized reading' (duration: 925.83056ms)"],"step_count":1} 2026-02-17T15:09:23.754773975Z {"level":"warn","ts":"2026-02-17T15:09:23.754727Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.828757Z","time spent":"925.962094ms","remote":"[::1]:37506","response type":"/etcdserverpb.KV/Range","request count":0,"request size":75,"response count":1,"response size":1271,"request content":"key:\"/kubernetes.io/rolebindings/openshift-cluster-storage-operator/prometheus\" "} 2026-02-17T15:09:23.754773975Z {"level":"warn","ts":"2026-02-17T15:09:23.748678Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.826883Z","time spent":"921.785641ms","remote":"[::1]:37324","response type":"/etcdserverpb.KV/Range","request count":0,"request size":114,"response count":1,"response size":1997,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-machine-config-operator/machine-config-controller\" "} 2026-02-17T15:09:23.754846686Z {"level":"warn","ts":"2026-02-17T15:09:23.754801Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"929.831359ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-authentication/prometheus-k8s\" ","response":"range_response_count:1 size:974"} 2026-02-17T15:09:23.754874287Z {"level":"info","ts":"2026-02-17T15:09:23.754840Z","caller":"traceutil/trace.go:171","msg":"trace[923381318] range","detail":"{range_begin:/kubernetes.io/roles/openshift-authentication/prometheus-k8s; range_end:; response_count:1; response_revision:9705; }","duration":"929.87828ms","start":"2026-02-17T15:09:22.824951Z","end":"2026-02-17T15:09:23.754829Z","steps":["trace[923381318] 'agreement among raft nodes before linearized reading' (duration: 929.803528ms)"],"step_count":1} 2026-02-17T15:09:23.754963239Z {"level":"warn","ts":"2026-02-17T15:09:23.754881Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.824945Z","time spent":"929.926961ms","remote":"[::1]:57486","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":998,"request content":"key:\"/kubernetes.io/roles/openshift-authentication/prometheus-k8s\" "} 2026-02-17T15:09:23.755044741Z {"level":"info","ts":"2026-02-17T15:09:23.748069Z","caller":"traceutil/trace.go:171","msg":"trace[331141085] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace; range_end:; response_count:1; response_revision:9705; }","duration":"281.516602ms","start":"2026-02-17T15:09:23.466544Z","end":"2026-02-17T15:09:23.748061Z","steps":["trace[331141085] 'agreement among raft nodes before linearized reading' (duration: 281.46136ms)"],"step_count":1} 2026-02-17T15:09:23.755160384Z {"level":"info","ts":"2026-02-17T15:09:23.755115Z","caller":"traceutil/trace.go:171","msg":"trace[1082340192] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-kube-controller-manager-operator; range_end:; response_count:1; response_revision:9705; }","duration":"927.583894ms","start":"2026-02-17T15:09:22.827514Z","end":"2026-02-17T15:09:23.755098Z","steps":["trace[1082340192] 'agreement among raft nodes before linearized reading' (duration: 927.555244ms)"],"step_count":1} 2026-02-17T15:09:23.755179494Z {"level":"warn","ts":"2026-02-17T15:09:23.755150Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.827512Z","time spent":"927.630706ms","remote":"[::1]:37326","response type":"/etcdserverpb.KV/Range","request count":0,"request size":70,"response count":1,"response size":2111,"request content":"key:\"/kubernetes.io/namespaces/openshift-kube-controller-manager-operator\" "} 2026-02-17T15:09:23.755322668Z {"level":"info","ts":"2026-02-17T15:09:23.755262Z","caller":"traceutil/trace.go:171","msg":"trace[514875364] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-node-cluster-rsrc-use; range_end:; response_count:1; response_revision:9705; }","duration":"926.131039ms","start":"2026-02-17T15:09:22.829112Z","end":"2026-02-17T15:09:23.755243Z","steps":["trace[514875364] 'agreement among raft nodes before linearized reading' (duration: 926.064757ms)"],"step_count":1} 2026-02-17T15:09:23.755322668Z {"level":"warn","ts":"2026-02-17T15:09:23.755302Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.829101Z","time spent":"926.19481ms","remote":"[::1]:40144","response type":"/etcdserverpb.KV/Range","request count":0,"request size":84,"response count":1,"response size":37386,"request content":"key:\"/kubernetes.io/configmaps/openshift-config-managed/dashboard-node-cluster-rsrc-use\" "} 2026-02-17T15:09:23.755373889Z {"level":"info","ts":"2026-02-17T15:09:23.755332Z","caller":"traceutil/trace.go:171","msg":"trace[1505124032] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-cloud-controller-manager-operator; range_end:; response_count:1; response_revision:9705; }","duration":"927.81466ms","start":"2026-02-17T15:09:22.827502Z","end":"2026-02-17T15:09:23.755317Z","steps":["trace[1505124032] 'agreement among raft nodes before linearized reading' (duration: 927.769489ms)"],"step_count":1} 2026-02-17T15:09:23.755390849Z {"level":"warn","ts":"2026-02-17T15:09:23.755368Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.827499Z","time spent":"927.861551ms","remote":"[::1]:37326","response type":"/etcdserverpb.KV/Range","request count":0,"request size":71,"response count":1,"response size":2169,"request content":"key:\"/kubernetes.io/namespaces/openshift-cloud-controller-manager-operator\" "} 2026-02-17T15:09:23.755447661Z {"level":"info","ts":"2026-02-17T15:09:23.755049Z","caller":"traceutil/trace.go:171","msg":"trace[507766338] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-dns-operator/prometheus-k8s; range_end:; response_count:1; response_revision:9705; }","duration":"928.055736ms","start":"2026-02-17T15:09:22.826972Z","end":"2026-02-17T15:09:23.755028Z","steps":["trace[507766338] 'agreement among raft nodes before linearized reading' (duration: 928.013245ms)"],"step_count":1} 2026-02-17T15:09:23.755593964Z {"level":"warn","ts":"2026-02-17T15:09:23.755547Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.826968Z","time spent":"928.559408ms","remote":"[::1]:37506","response type":"/etcdserverpb.KV/Range","request count":0,"request size":67,"response count":1,"response size":1086,"request content":"key:\"/kubernetes.io/rolebindings/openshift-dns-operator/prometheus-k8s\" "} 2026-02-17T15:09:23.755707127Z {"level":"info","ts":"2026-02-17T15:09:23.755656Z","caller":"traceutil/trace.go:171","msg":"trace[1209655899] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-kube-controller-manager-operator/prometheus-k8s; range_end:; response_count:1; response_revision:9705; }","duration":"928.65575ms","start":"2026-02-17T15:09:22.826983Z","end":"2026-02-17T15:09:23.755638Z","steps":["trace[1209655899] 'agreement among raft nodes before linearized reading' (duration: 928.6219ms)"],"step_count":1} 2026-02-17T15:09:23.755707127Z {"level":"info","ts":"2026-02-17T15:09:23.755661Z","caller":"traceutil/trace.go:171","msg":"trace[426710496] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-ingress-operator; range_end:; response_count:1; response_revision:9705; }","duration":"929.691455ms","start":"2026-02-17T15:09:22.825946Z","end":"2026-02-17T15:09:23.755638Z","steps":["trace[426710496] 'agreement among raft nodes before linearized reading' (duration: 929.646754ms)"],"step_count":1} 2026-02-17T15:09:23.755727497Z {"level":"info","ts":"2026-02-17T15:09:23.755697Z","caller":"traceutil/trace.go:171","msg":"trace[936974965] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/storageversionmigrations.migration.k8s.io; range_end:; response_count:1; response_revision:9705; }","duration":"926.732553ms","start":"2026-02-17T15:09:22.828942Z","end":"2026-02-17T15:09:23.755674Z","steps":["trace[936974965] 'agreement among raft nodes before linearized reading' (duration: 926.688152ms)"],"step_count":1} 2026-02-17T15:09:23.755727497Z {"level":"warn","ts":"2026-02-17T15:09:23.755703Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.826977Z","time spent":"928.715882ms","remote":"[::1]:37506","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":1222,"request content":"key:\"/kubernetes.io/rolebindings/openshift-kube-controller-manager-operator/prometheus-k8s\" "} 2026-02-17T15:09:23.755744498Z {"level":"warn","ts":"2026-02-17T15:09:23.755711Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.825939Z","time spent":"929.763657ms","remote":"[::1]:55264","response type":"/etcdserverpb.KV/Range","request count":0,"request size":56,"response count":1,"response size":2620,"request content":"key:\"/kubernetes.io/clusterroles/openshift-ingress-operator\" "} 2026-02-17T15:09:23.755744498Z {"level":"warn","ts":"2026-02-17T15:09:23.748337Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.818601Z","time spent":"929.729526ms","remote":"[::1]:37326","response type":"/etcdserverpb.KV/Range","request count":0,"request size":66,"response count":1,"response size":2289,"request content":"key:\"/kubernetes.io/namespaces/openshift-cluster-node-tuning-operator\" "} 2026-02-17T15:09:23.755760348Z {"level":"warn","ts":"2026-02-17T15:09:23.755733Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.828940Z","time spent":"926.786694ms","remote":"[::1]:37490","response type":"/etcdserverpb.KV/Range","request count":0,"request size":105,"response count":1,"response size":5750,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/storageversionmigrations.migration.k8s.io\" "} 2026-02-17T15:09:23.755990104Z {"level":"info","ts":"2026-02-17T15:09:23.755473Z","caller":"traceutil/trace.go:171","msg":"trace[265451162] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-etcd-operator; range_end:; response_count:1; response_revision:9705; }","duration":"928.013395ms","start":"2026-02-17T15:09:22.827437Z","end":"2026-02-17T15:09:23.755450Z","steps":["trace[265451162] 'agreement among raft nodes before linearized reading' (duration: 927.985334ms)"],"step_count":1} 2026-02-17T15:09:23.756093087Z {"level":"warn","ts":"2026-02-17T15:09:23.748401Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"929.798068ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics\" ","response":"range_response_count:1 size:1222"} 2026-02-17T15:09:23.756244931Z {"level":"info","ts":"2026-02-17T15:09:23.756187Z","caller":"traceutil/trace.go:171","msg":"trace[1469325459] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics; range_end:; response_count:1; response_revision:9705; }","duration":"937.58031ms","start":"2026-02-17T15:09:22.818582Z","end":"2026-02-17T15:09:23.756163Z","steps":["trace[1469325459] 'agreement among raft nodes before linearized reading' (duration: 929.768168ms)"],"step_count":1} 2026-02-17T15:09:23.756319083Z {"level":"info","ts":"2026-02-17T15:09:23.756247Z","caller":"traceutil/trace.go:171","msg":"trace[654947351] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/ipaddressclaims.ipam.cluster.x-k8s.io; range_end:; response_count:1; response_revision:9705; }","duration":"930.076156ms","start":"2026-02-17T15:09:22.825961Z","end":"2026-02-17T15:09:23.756037Z","steps":["trace[654947351] 'agreement among raft nodes before linearized reading' (duration: 929.194044ms)"],"step_count":1} 2026-02-17T15:09:23.756340633Z {"level":"warn","ts":"2026-02-17T15:09:23.756311Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.825955Z","time spent":"930.344822ms","remote":"[::1]:37490","response type":"/etcdserverpb.KV/Range","request count":0,"request size":101,"response count":1,"response size":11737,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/ipaddressclaims.ipam.cluster.x-k8s.io\" "} 2026-02-17T15:09:23.756444526Z {"level":"warn","ts":"2026-02-17T15:09:23.756386Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.818575Z","time spent":"937.712653ms","remote":"[::1]:37506","response type":"/etcdserverpb.KV/Range","request count":0,"request size":101,"response count":1,"response size":1246,"request content":"key:\"/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics\" "} 2026-02-17T15:09:23.756748593Z {"level":"info","ts":"2026-02-17T15:09:23.756683Z","caller":"traceutil/trace.go:171","msg":"trace[836413422] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.imageregistry.operator.openshift.io; range_end:; response_count:1; response_revision:9705; }","duration":"927.711927ms","start":"2026-02-17T15:09:22.828931Z","end":"2026-02-17T15:09:23.756643Z","steps":["trace[836413422] 'agreement among raft nodes before linearized reading' (duration: 927.071491ms)"],"step_count":1} 2026-02-17T15:09:23.756775253Z {"level":"warn","ts":"2026-02-17T15:09:23.756731Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.828929Z","time spent":"927.794339ms","remote":"[::1]:37490","response type":"/etcdserverpb.KV/Range","request count":0,"request size":107,"response count":1,"response size":89158,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.imageregistry.operator.openshift.io\" "} 2026-02-17T15:09:23.760035063Z {"level":"info","ts":"2026-02-17T15:09:23.755265Z","caller":"traceutil/trace.go:171","msg":"trace[143927164] range","detail":"{range_begin:/kubernetes.io/roles/openshift-image-registry/prometheus-k8s; range_end:; response_count:1; response_revision:9705; }","duration":"927.745478ms","start":"2026-02-17T15:09:22.827501Z","end":"2026-02-17T15:09:23.755246Z","steps":["trace[143927164] 'agreement among raft nodes before linearized reading' (duration: 927.717027ms)"],"step_count":1} 2026-02-17T15:09:23.760035063Z {"level":"info","ts":"2026-02-17T15:09:23.755450Z","caller":"traceutil/trace.go:171","msg":"trace[533455195] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-authentication-operator; range_end:; response_count:1; response_revision:9705; }","duration":"926.307873ms","start":"2026-02-17T15:09:22.829130Z","end":"2026-02-17T15:09:23.755438Z","steps":["trace[533455195] 'agreement among raft nodes before linearized reading' (duration: 926.253851ms)"],"step_count":1} 2026-02-17T15:09:23.760035063Z {"level":"warn","ts":"2026-02-17T15:09:23.759994Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.827496Z","time spent":"932.479484ms","remote":"[::1]:57486","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":1177,"request content":"key:\"/kubernetes.io/roles/openshift-image-registry/prometheus-k8s\" "} 2026-02-17T15:09:23.760080964Z {"level":"warn","ts":"2026-02-17T15:09:23.760021Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.829122Z","time spent":"930.880255ms","remote":"[::1]:37326","response type":"/etcdserverpb.KV/Range","request count":0,"request size":61,"response count":1,"response size":2092,"request content":"key:\"/kubernetes.io/namespaces/openshift-authentication-operator\" "} 2026-02-17T15:09:23.760813713Z {"level":"info","ts":"2026-02-17T15:09:23.755962Z","caller":"traceutil/trace.go:171","msg":"trace[375764508] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config/admin-acks; range_end:; response_count:1; response_revision:9705; }","duration":"928.981028ms","start":"2026-02-17T15:09:22.826961Z","end":"2026-02-17T15:09:23.755942Z","steps":["trace[375764508] 'agreement among raft nodes before linearized reading' (duration: 928.832454ms)"],"step_count":1} 2026-02-17T15:09:23.760847904Z {"level":"warn","ts":"2026-02-17T15:09:23.760789Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.826958Z","time spent":"933.817497ms","remote":"[::1]:40144","response type":"/etcdserverpb.KV/Range","request count":0,"request size":55,"response count":1,"response size":943,"request content":"key:\"/kubernetes.io/configmaps/openshift-config/admin-acks\" "} 2026-02-17T15:09:23.761085599Z {"level":"info","ts":"2026-02-17T15:09:23.761008Z","caller":"traceutil/trace.go:171","msg":"trace[38642764] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.samples.operator.openshift.io; range_end:; response_count:1; response_revision:9705; }","duration":"933.598982ms","start":"2026-02-17T15:09:22.827386Z","end":"2026-02-17T15:09:23.760985Z","steps":["trace[38642764] 'agreement among raft nodes before linearized reading' (duration: 928.123577ms)"],"step_count":1} 2026-02-17T15:09:23.761085599Z {"level":"warn","ts":"2026-02-17T15:09:23.761061Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.827379Z","time spent":"933.673803ms","remote":"[::1]:37490","response type":"/etcdserverpb.KV/Range","request count":0,"request size":101,"response count":1,"response size":9173,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.samples.operator.openshift.io\" "} 2026-02-17T15:09:23.761648094Z {"level":"info","ts":"2026-02-17T15:09:23.761588Z","caller":"traceutil/trace.go:171","msg":"trace[835294541] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-gcp; range_end:; response_count:1; response_revision:9705; }","duration":"936.531533ms","start":"2026-02-17T15:09:22.825012Z","end":"2026-02-17T15:09:23.761544Z","steps":["trace[835294541] 'agreement among raft nodes before linearized reading' (duration: 936.424371ms)"],"step_count":1} 2026-02-17T15:09:23.761648094Z {"level":"warn","ts":"2026-02-17T15:09:23.761599Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.827431Z","time spent":"928.61871ms","remote":"[::1]:37326","response type":"/etcdserverpb.KV/Range","request count":0,"request size":51,"response count":1,"response size":2017,"request content":"key:\"/kubernetes.io/namespaces/openshift-etcd-operator\" "} 2026-02-17T15:09:23.761695825Z {"level":"warn","ts":"2026-02-17T15:09:23.761641Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.825004Z","time spent":"936.627506ms","remote":"[::1]:51526","response type":"/etcdserverpb.KV/Range","request count":0,"request size":148,"response count":1,"response size":1993,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-gcp\" "} 2026-02-17T15:09:23.763915879Z {"level":"warn","ts":"2026-02-17T15:09:23.763623Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"937.887827ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/authentications/cluster\" ","response":"range_response_count:1 size:1100"} 2026-02-17T15:09:23.763915879Z {"level":"info","ts":"2026-02-17T15:09:23.763871Z","caller":"traceutil/trace.go:171","msg":"trace[447038994] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/authentications/cluster; range_end:; response_count:1; response_revision:9705; }","duration":"938.146803ms","start":"2026-02-17T15:09:22.825708Z","end":"2026-02-17T15:09:23.763855Z","steps":["trace[447038994] 'agreement among raft nodes before linearized reading' (duration: 935.825166ms)"],"step_count":1} 2026-02-17T15:09:23.763961410Z {"level":"warn","ts":"2026-02-17T15:09:23.763920Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:09:22.825701Z","time spent":"938.196024ms","remote":"[::1]:51548","response type":"/etcdserverpb.KV/Range","request count":0,"request size":60,"response count":1,"response size":1124,"request content":"key:\"/kubernetes.io/config.openshift.io/authentications/cluster\" "} 2026-02-17T15:09:28.644980707Z {"level":"warn","ts":"2026-02-17T15:09:28.644795Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"200.050182ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:openshift-controller-manager-operator\" ","response":"range_response_count:1 size:1271"} 2026-02-17T15:09:28.644980707Z {"level":"info","ts":"2026-02-17T15:09:28.644901Z","caller":"traceutil/trace.go:171","msg":"trace[731933012] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:openshift-controller-manager-operator; range_end:; response_count:1; response_revision:9714; }","duration":"200.189525ms","start":"2026-02-17T15:09:28.444687Z","end":"2026-02-17T15:09:28.644876Z","steps":["trace[731933012] 'range keys from in-memory index tree' (duration: 199.9607ms)"],"step_count":1} 2026-02-17T15:09:28.645715845Z {"level":"info","ts":"2026-02-17T15:09:28.645445Z","caller":"traceutil/trace.go:171","msg":"trace[633215148] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-etcd-operator/etcd-service-ca-bundle; range_end:; response_count:1; response_revision:9714; }","duration":"175.143601ms","start":"2026-02-17T15:09:28.470271Z","end":"2026-02-17T15:09:28.645415Z","steps":["trace[633215148] 'range keys from in-memory index tree' (duration: 174.954425ms)"],"step_count":1} 2026-02-17T15:09:28.646064034Z {"level":"info","ts":"2026-02-17T15:09:28.645944Z","caller":"traceutil/trace.go:171","msg":"trace[1586470005] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/hostfirmwarecomponents.metal3.io; range_end:; response_count:1; response_revision:9714; }","duration":"150.874724ms","start":"2026-02-17T15:09:28.495052Z","end":"2026-02-17T15:09:28.645927Z","steps":["trace[1586470005] 'range keys from in-memory index tree' (duration: 150.726521ms)"],"step_count":1} 2026-02-17T15:09:28.646154096Z {"level":"info","ts":"2026-02-17T15:09:28.646119Z","caller":"traceutil/trace.go:171","msg":"trace[1362876000] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-kube-controller-manager-operator/kube-controller-manager-operator; range_end:; response_count:1; response_revision:9714; }","duration":"125.687506ms","start":"2026-02-17T15:09:28.520425Z","end":"2026-02-17T15:09:28.646112Z","steps":["trace[1362876000] 'range keys from in-memory index tree' (duration: 125.41994ms)"],"step_count":1} 2026-02-17T15:09:29.015566266Z {"level":"info","ts":"2026-02-17T15:09:29.015401Z","caller":"traceutil/trace.go:171","msg":"trace[1961288514] linearizableReadLoop","detail":"{readStateIndex:10130; appliedIndex:10129; }","duration":"220.797212ms","start":"2026-02-17T15:09:28.794559Z","end":"2026-02-17T15:09:29.015356Z","steps":["trace[1961288514] 'read index received' (duration: 220.605757ms)","trace[1961288514] 'applied index is now lower than readState.Index' (duration: 190.815µs)"],"step_count":2} 2026-02-17T15:09:29.015608827Z {"level":"info","ts":"2026-02-17T15:09:29.015412Z","caller":"traceutil/trace.go:171","msg":"trace[1234794545] transaction","detail":"{read_only:false; response_revision:9715; number_of_response:1; }","duration":"222.990984ms","start":"2026-02-17T15:09:28.792391Z","end":"2026-02-17T15:09:29.015382Z","steps":["trace[1234794545] 'process raft request' (duration: 222.82382ms)"],"step_count":1} 2026-02-17T15:09:29.015608827Z {"level":"warn","ts":"2026-02-17T15:09:29.015570Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"220.993676ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-cluster-olm-operator/cluster-olm-operator\" ","response":"range_response_count:1 size:6681"} 2026-02-17T15:09:29.015639967Z {"level":"info","ts":"2026-02-17T15:09:29.015612Z","caller":"traceutil/trace.go:171","msg":"trace[750261850] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-olm-operator/cluster-olm-operator; range_end:; response_count:1; response_revision:9715; }","duration":"221.087709ms","start":"2026-02-17T15:09:28.794515Z","end":"2026-02-17T15:09:29.015603Z","steps":["trace[750261850] 'agreement among raft nodes before linearized reading' (duration: 220.966056ms)"],"step_count":1} 2026-02-17T15:09:29.015804631Z {"level":"info","ts":"2026-02-17T15:09:29.015746Z","caller":"traceutil/trace.go:171","msg":"trace[1446036534] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:9715; }","duration":"101.991405ms","start":"2026-02-17T15:09:28.913744Z","end":"2026-02-17T15:09:29.015735Z","steps":["trace[1446036534] 'agreement among raft nodes before linearized reading' (duration: 101.945284ms)"],"step_count":1} 2026-02-17T15:09:29.015853813Z {"level":"warn","ts":"2026-02-17T15:09:29.015780Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"217.725355ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" ","response":"range_response_count:1 size:5206"} 2026-02-17T15:09:29.015954465Z {"level":"info","ts":"2026-02-17T15:09:29.015900Z","caller":"traceutil/trace.go:171","msg":"trace[1990190517] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:9715; }","duration":"217.856018ms","start":"2026-02-17T15:09:28.797985Z","end":"2026-02-17T15:09:29.015841Z","steps":["trace[1990190517] 'agreement among raft nodes before linearized reading' (duration: 217.692744ms)"],"step_count":1} 2026-02-17T15:09:29.016030187Z {"level":"info","ts":"2026-02-17T15:09:29.015942Z","caller":"traceutil/trace.go:171","msg":"trace[1317022372] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:authentication; range_end:; response_count:1; response_revision:9715; }","duration":"120.300974ms","start":"2026-02-17T15:09:28.895616Z","end":"2026-02-17T15:09:29.015917Z","steps":["trace[1317022372] 'agreement among raft nodes before linearized reading' (duration: 120.209772ms)"],"step_count":1} 2026-02-17T15:09:29.016069138Z {"level":"info","ts":"2026-02-17T15:09:29.016028Z","caller":"traceutil/trace.go:171","msg":"trace[1131500534] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/openshift-csi-snapshot-controller-role; range_end:; response_count:1; response_revision:9715; }","duration":"196.109624ms","start":"2026-02-17T15:09:28.819909Z","end":"2026-02-17T15:09:29.016018Z","steps":["trace[1131500534] 'agreement among raft nodes before linearized reading' (duration: 196.079374ms)"],"step_count":1} 2026-02-17T15:09:29.016505909Z {"level":"info","ts":"2026-02-17T15:09:29.016407Z","caller":"traceutil/trace.go:171","msg":"trace[687873860] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-version/cluster-version-operator; range_end:; response_count:1; response_revision:9715; }","duration":"171.389168ms","start":"2026-02-17T15:09:28.844599Z","end":"2026-02-17T15:09:29.015988Z","steps":["trace[687873860] 'agreement among raft nodes before linearized reading' (duration: 171.316456ms)"],"step_count":1} 2026-02-17T15:09:29.016620612Z {"level":"info","ts":"2026-02-17T15:09:29.016549Z","caller":"traceutil/trace.go:171","msg":"trace[1739594025] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-config-operator/machine-config-controller; range_end:; response_count:1; response_revision:9715; }","duration":"145.676777ms","start":"2026-02-17T15:09:28.870057Z","end":"2026-02-17T15:09:29.015733Z","steps":["trace[1739594025] 'agreement among raft nodes before linearized reading' (duration: 145.643176ms)"],"step_count":1} 2026-02-17T15:09:35.596888257Z {"level":"info","ts":"2026-02-17T15:09:35.596717Z","caller":"traceutil/trace.go:171","msg":"trace[73479726] linearizableReadLoop","detail":"{readStateIndex:10227; appliedIndex:10226; }","duration":"177.533789ms","start":"2026-02-17T15:09:35.419156Z","end":"2026-02-17T15:09:35.596689Z","steps":["trace[73479726] 'read index received' (duration: 177.267622ms)","trace[73479726] 'applied index is now lower than readState.Index' (duration: 264.467µs)"],"step_count":2} 2026-02-17T15:09:35.596967549Z {"level":"info","ts":"2026-02-17T15:09:35.596852Z","caller":"traceutil/trace.go:171","msg":"trace[690853302] transaction","detail":"{read_only:false; response_revision:9808; number_of_response:1; }","duration":"200.587235ms","start":"2026-02-17T15:09:35.396235Z","end":"2026-02-17T15:09:35.596822Z","steps":["trace[690853302] 'process raft request' (duration: 200.196156ms)"],"step_count":1} 2026-02-17T15:09:35.596967549Z {"level":"info","ts":"2026-02-17T15:09:35.596935Z","caller":"traceutil/trace.go:171","msg":"trace[2042311998] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machineconfigurations.operator.openshift.io; range_end:; response_count:1; response_revision:9808; }","duration":"177.809295ms","start":"2026-02-17T15:09:35.419107Z","end":"2026-02-17T15:09:35.596916Z","steps":["trace[2042311998] 'agreement among raft nodes before linearized reading' (duration: 177.736863ms)"],"step_count":1} 2026-02-17T15:09:35.621943263Z {"level":"info","ts":"2026-02-17T15:09:35.621797Z","caller":"traceutil/trace.go:171","msg":"trace[86080829] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-ingress-operator/ingress-operator; range_end:; response_count:1; response_revision:9809; }","duration":"101.756768ms","start":"2026-02-17T15:09:35.520015Z","end":"2026-02-17T15:09:35.621771Z","steps":["trace[86080829] 'agreement among raft nodes before linearized reading' (duration: 101.681816ms)"],"step_count":1} 2026-02-17T15:09:35.621991914Z {"level":"info","ts":"2026-02-17T15:09:35.621941Z","caller":"traceutil/trace.go:171","msg":"trace[160096003] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-operator-lifecycle-manager/collect-profiles; range_end:; response_count:1; response_revision:9809; }","duration":"126.28204ms","start":"2026-02-17T15:09:35.495649Z","end":"2026-02-17T15:09:35.621931Z","steps":["trace[160096003] 'agreement among raft nodes before linearized reading' (duration: 126.218659ms)"],"step_count":1} 2026-02-17T15:09:35.622073306Z {"level":"info","ts":"2026-02-17T15:09:35.621832Z","caller":"traceutil/trace.go:171","msg":"trace[1815694650] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-cluster-storage-operator/cluster-storage-operator-metrics; range_end:; response_count:1; response_revision:9809; }","duration":"176.950464ms","start":"2026-02-17T15:09:35.444858Z","end":"2026-02-17T15:09:35.621808Z","steps":["trace[1815694650] 'agreement among raft nodes before linearized reading' (duration: 176.886732ms)"],"step_count":1} 2026-02-17T15:09:35.622167548Z {"level":"info","ts":"2026-02-17T15:09:35.622033Z","caller":"traceutil/trace.go:171","msg":"trace[1236960306] transaction","detail":"{read_only:false; response_revision:9809; number_of_response:1; }","duration":"150.477284ms","start":"2026-02-17T15:09:35.471509Z","end":"2026-02-17T15:09:35.621986Z","steps":["trace[1236960306] 'process raft request' (duration: 150.007633ms)"],"step_count":1} 2026-02-17T15:09:40.161083696Z {"level":"info","ts":"2026-02-17T15:09:40.160915Z","caller":"traceutil/trace.go:171","msg":"trace[1890513783] transaction","detail":"{read_only:false; response_revision:9923; number_of_response:1; }","duration":"111.981659ms","start":"2026-02-17T15:09:40.048904Z","end":"2026-02-17T15:09:40.160886Z","steps":["trace[1890513783] 'process raft request' (duration: 111.829036ms)"],"step_count":1} 2026-02-17T15:09:41.203963091Z {"level":"info","ts":"2026-02-17T15:09:41.203867Z","caller":"traceutil/trace.go:171","msg":"trace[820662312] range","detail":"{range_begin:/kubernetes.io/authorization.openshift.io/rolebindingrestrictions; range_end:; response_count:0; response_revision:10006; }","duration":"107.5205ms","start":"2026-02-17T15:09:41.096321Z","end":"2026-02-17T15:09:41.203841Z","steps":["trace[820662312] 'range keys from in-memory index tree' (duration: 107.385046ms)"],"step_count":1} 2026-02-17T15:09:41.204076913Z {"level":"info","ts":"2026-02-17T15:09:41.203975Z","caller":"traceutil/trace.go:171","msg":"trace[837981437] range","detail":"{range_begin:/kubernetes.io/pods/openshift-insights/insights-operator-cb4f7b4cf-cmbjq; range_end:; response_count:1; response_revision:10006; }","duration":"108.263307ms","start":"2026-02-17T15:09:41.095695Z","end":"2026-02-17T15:09:41.203958Z","steps":["trace[837981437] 'range keys from in-memory index tree' (duration: 108.121615ms)"],"step_count":1} 2026-02-17T15:09:41.204580105Z {"level":"info","ts":"2026-02-17T15:09:41.204506Z","caller":"traceutil/trace.go:171","msg":"trace[686493527] transaction","detail":"{read_only:false; response_revision:10007; number_of_response:1; }","duration":"107.234222ms","start":"2026-02-17T15:09:41.097248Z","end":"2026-02-17T15:09:41.204482Z","steps":["trace[686493527] 'process raft request' (duration: 46.971512ms)","trace[686493527] 'compare' (duration: 60.030884ms)"],"step_count":2} 2026-02-17T15:09:41.204695499Z {"level":"info","ts":"2026-02-17T15:09:41.204651Z","caller":"traceutil/trace.go:171","msg":"trace[1427843127] transaction","detail":"{read_only:false; response_revision:10008; number_of_response:1; }","duration":"102.016125ms","start":"2026-02-17T15:09:41.102615Z","end":"2026-02-17T15:09:41.204631Z","steps":["trace[1427843127] 'process raft request' (duration: 101.824249ms)"],"step_count":1} 2026-02-17T15:09:41.204894904Z {"level":"info","ts":"2026-02-17T15:09:41.204863Z","caller":"traceutil/trace.go:171","msg":"trace[1912749899] linearizableReadLoop","detail":"{readStateIndex:10429; appliedIndex:10427; }","duration":"100.767544ms","start":"2026-02-17T15:09:41.104086Z","end":"2026-02-17T15:09:41.204854Z","steps":["trace[1912749899] 'read index received' (duration: 40.265008ms)","trace[1912749899] 'applied index is now lower than readState.Index' (duration: 60.501896ms)"],"step_count":2} 2026-02-17T15:09:41.205030537Z {"level":"info","ts":"2026-02-17T15:09:41.204988Z","caller":"traceutil/trace.go:171","msg":"trace[702651779] range","detail":"{range_begin:/kubernetes.io/pods/openshift-cluster-storage-operator/cluster-storage-operator-75b869db96-qbmw5; range_end:; response_count:1; response_revision:10011; }","duration":"100.893747ms","start":"2026-02-17T15:09:41.104082Z","end":"2026-02-17T15:09:41.204976Z","steps":["trace[702651779] 'agreement among raft nodes before linearized reading' (duration: 100.813695ms)"],"step_count":1} 2026-02-17T15:09:46.879054004Z {"level":"warn","ts":"2026-02-17T15:09:46.878901Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"213.711627ms","expected-duration":"200ms","prefix":"","request":"header: txn: success:> failure: >>","response":"size:16"} 2026-02-17T15:09:46.879093094Z {"level":"info","ts":"2026-02-17T15:09:46.879045Z","caller":"traceutil/trace.go:171","msg":"trace[710665684] linearizableReadLoop","detail":"{readStateIndex:10688; appliedIndex:10687; }","duration":"232.736374ms","start":"2026-02-17T15:09:46.646296Z","end":"2026-02-17T15:09:46.879033Z","steps":["trace[710665684] 'read index received' (duration: 18.829032ms)","trace[710665684] 'applied index is now lower than readState.Index' (duration: 213.906592ms)"],"step_count":2} 2026-02-17T15:09:46.879138496Z {"level":"info","ts":"2026-02-17T15:09:46.879102Z","caller":"traceutil/trace.go:171","msg":"trace[588448896] transaction","detail":"{read_only:false; response_revision:10232; number_of_response:1; }","duration":"250.591622ms","start":"2026-02-17T15:09:46.628502Z","end":"2026-02-17T15:09:46.879094Z","steps":["trace[588448896] 'process raft request' (duration: 36.622639ms)","trace[588448896] 'compare' (duration: 213.443101ms)"],"step_count":2} 2026-02-17T15:09:46.879306670Z {"level":"warn","ts":"2026-02-17T15:09:46.879236Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"219.440857ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-02-17T15:09:46.879306670Z {"level":"info","ts":"2026-02-17T15:09:46.879277Z","caller":"traceutil/trace.go:171","msg":"trace[691911395] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10232; }","duration":"219.507079ms","start":"2026-02-17T15:09:46.659762Z","end":"2026-02-17T15:09:46.879269Z","steps":["trace[691911395] 'agreement among raft nodes before linearized reading' (duration: 219.445547ms)"],"step_count":1} 2026-02-17T15:09:46.879488155Z {"level":"warn","ts":"2026-02-17T15:09:46.879400Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"233.090663ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolelinks.console.openshift.io\" ","response":"range_response_count:1 size:7739"} 2026-02-17T15:09:46.879506715Z {"level":"info","ts":"2026-02-17T15:09:46.879484Z","caller":"traceutil/trace.go:171","msg":"trace[975708157] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolelinks.console.openshift.io; range_end:; response_count:1; response_revision:10232; }","duration":"233.199816ms","start":"2026-02-17T15:09:46.646250Z","end":"2026-02-17T15:09:46.879450Z","steps":["trace[975708157] 'agreement among raft nodes before linearized reading' (duration: 233.069282ms)"],"step_count":1} 2026-02-17T15:09:46.879550946Z {"level":"info","ts":"2026-02-17T15:09:46.879521Z","caller":"traceutil/trace.go:171","msg":"trace[52925814] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:10232; }","duration":"104.959317ms","start":"2026-02-17T15:09:46.774554Z","end":"2026-02-17T15:09:46.879514Z","steps":["trace[52925814] 'agreement among raft nodes before linearized reading' (duration: 104.936677ms)"],"step_count":1} 2026-02-17T15:09:46.879684290Z {"level":"warn","ts":"2026-02-17T15:09:46.879643Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"208.080769ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/marketplace-operator\" ","response":"range_response_count:1 size:1354"} 2026-02-17T15:09:46.879684290Z {"level":"info","ts":"2026-02-17T15:09:46.879655Z","caller":"traceutil/trace.go:171","msg":"trace[99898775] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10232; }","duration":"129.242534ms","start":"2026-02-17T15:09:46.750398Z","end":"2026-02-17T15:09:46.879641Z","steps":["trace[99898775] 'agreement among raft nodes before linearized reading' (duration: 129.209633ms)"],"step_count":1} 2026-02-17T15:09:46.879723130Z {"level":"info","ts":"2026-02-17T15:09:46.879680Z","caller":"traceutil/trace.go:171","msg":"trace[1532057901] range","detail":"{range_begin:/kubernetes.io/clusterroles/marketplace-operator; range_end:; response_count:1; response_revision:10232; }","duration":"208.13774ms","start":"2026-02-17T15:09:46.671529Z","end":"2026-02-17T15:09:46.879667Z","steps":["trace[1532057901] 'agreement among raft nodes before linearized reading' (duration: 208.091519ms)"],"step_count":1} 2026-02-17T15:09:46.879733941Z {"level":"info","ts":"2026-02-17T15:09:46.879714Z","caller":"traceutil/trace.go:171","msg":"trace[1763583860] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:scc:hostmount-anyuid-v2; range_end:; response_count:1; response_revision:10232; }","duration":"159.941777ms","start":"2026-02-17T15:09:46.719765Z","end":"2026-02-17T15:09:46.879707Z","steps":["trace[1763583860] 'agreement among raft nodes before linearized reading' (duration: 159.922927ms)"],"step_count":1} 2026-02-17T15:09:46.879866264Z {"level":"info","ts":"2026-02-17T15:09:46.879726Z","caller":"traceutil/trace.go:171","msg":"trace[1242690066] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-etcd-operator/metrics; range_end:; response_count:1; response_revision:10232; }","duration":"184.461309ms","start":"2026-02-17T15:09:46.695214Z","end":"2026-02-17T15:09:46.879675Z","steps":["trace[1242690066] 'agreement among raft nodes before linearized reading' (duration: 184.317786ms)"],"step_count":1} 2026-02-17T15:09:46.879972206Z {"level":"info","ts":"2026-02-17T15:09:46.879639Z","caller":"traceutil/trace.go:171","msg":"trace[1779989057] range","detail":"{range_begin:/kubernetes.io/roles/openshift-cluster-machine-approver/machine-approver; range_end:; response_count:1; response_revision:10232; }","duration":"133.5565ms","start":"2026-02-17T15:09:46.746070Z","end":"2026-02-17T15:09:46.879627Z","steps":["trace[1779989057] 'agreement among raft nodes before linearized reading' (duration: 133.523259ms)"],"step_count":1} 2026-02-17T15:09:47.129404210Z {"level":"info","ts":"2026-02-17T15:09:47.129249Z","caller":"traceutil/trace.go:171","msg":"trace[1422879068] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-olm-operator; range_end:; response_count:1; response_revision:10232; }","duration":"109.476518ms","start":"2026-02-17T15:09:47.019748Z","end":"2026-02-17T15:09:47.129224Z","steps":["trace[1422879068] 'range keys from in-memory index tree' (duration: 109.355075ms)"],"step_count":1} 2026-02-17T15:09:47.129760929Z {"level":"info","ts":"2026-02-17T15:09:47.129674Z","caller":"traceutil/trace.go:171","msg":"trace[961815191] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10232; }","duration":"146.920367ms","start":"2026-02-17T15:09:46.982746Z","end":"2026-02-17T15:09:47.129667Z","steps":["trace[961815191] 'range keys from in-memory index tree' (duration: 146.865505ms)"],"step_count":1} 2026-02-17T15:09:47.129854911Z {"level":"info","ts":"2026-02-17T15:09:47.129804Z","caller":"traceutil/trace.go:171","msg":"trace[242509519] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:10232; }","duration":"142.836547ms","start":"2026-02-17T15:09:46.986960Z","end":"2026-02-17T15:09:47.129797Z","steps":["trace[242509519] 'range keys from in-memory index tree' (duration: 142.801626ms)"],"step_count":1} 2026-02-17T15:09:47.130004605Z {"level":"info","ts":"2026-02-17T15:09:47.129934Z","caller":"traceutil/trace.go:171","msg":"trace[2079513264] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-cluster-storage-operator/csi-snapshot-controller-operator-config; range_end:; response_count:1; response_revision:10232; }","duration":"135.702951ms","start":"2026-02-17T15:09:46.994223Z","end":"2026-02-17T15:09:47.129926Z","steps":["trace[2079513264] 'range keys from in-memory index tree' (duration: 135.653479ms)"],"step_count":1} 2026-02-17T15:09:47.130084187Z {"level":"info","ts":"2026-02-17T15:09:47.130047Z","caller":"traceutil/trace.go:171","msg":"trace[1759595473] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10232; }","duration":"121.064222ms","start":"2026-02-17T15:09:47.008978Z","end":"2026-02-17T15:09:47.130042Z","steps":["trace[1759595473] 'range keys from in-memory index tree' (duration: 120.983531ms)"],"step_count":1} 2026-02-17T15:09:47.130248631Z {"level":"info","ts":"2026-02-17T15:09:47.130183Z","caller":"traceutil/trace.go:171","msg":"trace[1323731398] range","detail":"{range_begin:/kubernetes.io/events/openshift-machine-api/cluster-autoscaler-operator-67fd9768b5-6dzpr.1895113c5b3ebc75; range_end:; response_count:1; response_revision:10232; }","duration":"116.888221ms","start":"2026-02-17T15:09:47.013287Z","end":"2026-02-17T15:09:47.130176Z","steps":["trace[1323731398] 'range keys from in-memory index tree' (duration: 116.780657ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715145102315023117 0ustar00000000000000002026-02-17T15:04:23.329044184Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-865765995-c58rq/oauth-apiserver_current.log0000640000000000000000000011402415145102315030721 0ustar00000000000000002026-02-17T15:07:52.770564725Z E0217 15:07:52.769205 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:07:52.770564725Z E0217 15:07:52.769310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:07:52.770564725Z E0217 15:07:52.769644 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:07:52.770564725Z E0217 15:07:52.769769 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:07:52.770564725Z E0217 15:07:52.769856 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:07:52.770564725Z E0217 15:07:52.769879 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.574416955Z E0217 15:08:17.574354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.574573599Z E0217 15:08:17.574526 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.574573599Z E0217 15:08:17.574561 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.574683042Z E0217 15:08:17.574630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.574784884Z E0217 15:08:17.574362 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.596562466Z E0217 15:08:17.596489 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.596817032Z E0217 15:08:17.596541 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.596940625Z E0217 15:08:17.596564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.597084528Z E0217 15:08:17.596619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:17.597219842Z E0217 15:08:17.596618 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.754519556Z E0217 15:08:22.753077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.764839573Z E0217 15:08:22.763029 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.764839573Z E0217 15:08:22.763508 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.764839573Z E0217 15:08:22.763837 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.764839573Z E0217 15:08:22.764113 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.794291074Z E0217 15:08:22.794221 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.794291074Z E0217 15:08:22.794252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.794333505Z E0217 15:08:22.794280 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.794333505Z E0217 15:08:22.794285 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.794672474Z E0217 15:08:22.794613 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.856711465Z E0217 15:08:22.856629 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.866889628Z E0217 15:08:22.866795 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.920291915Z E0217 15:08:22.920185 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:22.932502719Z E0217 15:08:22.931936 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.589579166Z E0217 15:08:47.587366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.589579166Z E0217 15:08:47.587425 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.589579166Z E0217 15:08:47.587790 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.589579166Z E0217 15:08:47.588226 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.589579166Z E0217 15:08:47.588434 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.609102766Z E0217 15:08:47.608978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.609102766Z E0217 15:08:47.609026 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.609178348Z E0217 15:08:47.609146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.609610628Z E0217 15:08:47.609531 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:47.609649989Z E0217 15:08:47.609629 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.768699483Z E0217 15:08:52.768629 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.769371159Z E0217 15:08:52.769310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.769565214Z E0217 15:08:52.769501 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.769728058Z E0217 15:08:52.769693 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.769961034Z E0217 15:08:52.769906 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.773512040Z E0217 15:08:52.772576 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.773512040Z E0217 15:08:52.772595 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.773512040Z E0217 15:08:52.772651 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.773512040Z E0217 15:08:52.772696 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:08:52.773512040Z E0217 15:08:52.772578 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.596832797Z E0217 15:09:17.595146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.596832797Z E0217 15:09:17.595204 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.596832797Z E0217 15:09:17.595220 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.596832797Z E0217 15:09:17.595423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.596832797Z E0217 15:09:17.595432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.618157750Z E0217 15:09:17.618051 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.619052981Z E0217 15:09:17.618435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.619052981Z E0217 15:09:17.618696 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.619052981Z E0217 15:09:17.618972 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:17.619052981Z E0217 15:09:17.618989 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.780536845Z E0217 15:09:22.779412 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.785536658Z E0217 15:09:22.785408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.785999840Z E0217 15:09:22.785953 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.786265136Z E0217 15:09:22.786217 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.786590004Z E0217 15:09:22.786545 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.786833949Z E0217 15:09:22.786787 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.787101546Z E0217 15:09:22.787057 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.787338292Z E0217 15:09:22.787294 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.787572988Z E0217 15:09:22.787530 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.787804084Z E0217 15:09:22.787761 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.846580317Z E0217 15:09:22.846519 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.852602534Z E0217 15:09:22.852578 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.875870076Z E0217 15:09:22.875832 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:22.881498234Z E0217 15:09:22.881421 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:44.795749565Z I0217 15:09:44.795692 1 policy_source.go:224] refreshing policies 2026-02-17T15:09:45.796699960Z I0217 15:09:45.796613 1 policy_source.go:224] refreshing policies 2026-02-17T15:09:47.607503489Z E0217 15:09:47.607309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.610366399Z E0217 15:09:47.607969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.610366399Z E0217 15:09:47.608394 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.610366399Z E0217 15:09:47.608799 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.610366399Z E0217 15:09:47.609146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.629381095Z E0217 15:09:47.629274 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.629432137Z E0217 15:09:47.629367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.629549699Z E0217 15:09:47.629490 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.629651712Z E0217 15:09:47.629274 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:47.629832876Z E0217 15:09:47.629776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:50.808216312Z I0217 15:09:50.808110 1 policy_source.go:224] refreshing policies 2026-02-17T15:09:51.811711799Z I0217 15:09:51.811573 1 policy_source.go:224] refreshing policies 2026-02-17T15:09:51.840046294Z I0217 15:09:51.839935 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-02-17T15:09:51.842959987Z I0217 15:09:51.842883 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:09:52.767043614Z E0217 15:09:52.766982 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.767043614Z E0217 15:09:52.767001 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.767700010Z E0217 15:09:52.767246 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.767700010Z E0217 15:09:52.767432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.767700010Z E0217 15:09:52.767539 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.769532755Z E0217 15:09:52.767741 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.769532755Z E0217 15:09:52.767798 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.769532755Z E0217 15:09:52.767950 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.769532755Z E0217 15:09:52.768065 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:09:52.769532755Z E0217 15:09:52.768141 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/router-default-864ddd5f56-g8w2f.json0000640000000000000000000001534115145102315023130 0ustar0000000000000000{"metadata":{"name":"router-default-864ddd5f56-g8w2f","generateName":"router-default-864ddd5f56-","namespace":"openshift-ingress","uid":"a2d6e329-7ad8-4fc2-accc-66827f11743d","resourceVersion":"6879","creationTimestamp":"2026-02-17T15:03:38Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"575d6c6cf5","pod-template-hash":"864ddd5f56"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-864ddd5f56","uid":"d5d54c49-7ca1-4267-889c-310afe52d0fc","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-8q8jf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-8q8jf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["575d6c6cf5"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:38Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062215145102315037313 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-jrdqm2026-02-17T15:08:08.668230730Z Copying system trust bundle 2026-02-17T15:08:08.757560380Z W0217 15:08:08.757437 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-17T15:08:08.758320468Z I0217 15:08:08.758248 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:08.760337769Z I0217 15:08:08.759951 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:08:08.760562865Z I0217 15:08:08.760488 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:08:08.761839176Z I0217 15:08:08.761674 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:32.561394813Z I0217 15:08:32.561268 1 builder.go:304] cluster-authentication-operator version - 2026-02-17T15:08:32.563159056Z I0217 15:08:32.563060 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:08:54.476433521Z I0217 15:08:54.476284 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-17T15:08:54.484041647Z I0217 15:08:54.483919 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-17T15:08:54.484041647Z I0217 15:08:54.484023 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-17T15:08:54.484206061Z I0217 15:08:54.484131 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-17T15:08:54.484616991Z I0217 15:08:54.484522 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-17T15:08:54.494588287Z I0217 15:08:54.492768 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:08:54.494588287Z W0217 15:08:54.492798 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:08:54.494588287Z W0217 15:08:54.492802 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:08:54.494588287Z W0217 15:08:54.492806 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:08:54.494588287Z W0217 15:08:54.492810 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:08:54.494588287Z W0217 15:08:54.492813 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:08:54.494588287Z W0217 15:08:54.492815 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:08:54.494588287Z I0217 15:08:54.493025 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-17T15:08:54.503014183Z I0217 15:08:54.501792 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-17T15:08:54.503014183Z I0217 15:08:54.502421 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-02-17T15:08:54.504989751Z I0217 15:08:54.503789 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:08:54.504989751Z I0217 15:08:54.503841 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:08:54.504989751Z I0217 15:08:54.503886 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:08:54.504989751Z I0217 15:08:54.503898 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:08:54.504989751Z I0217 15:08:54.503928 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:08:54.504989751Z I0217 15:08:54.503961 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:08:54.504989751Z I0217 15:08:54.504249 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:08:54.504989751Z I0217 15:08:54.504259 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:08:54.504989751Z I0217 15:08:54.504408 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:08:54.512824234Z I0217 15:08:54.509922 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:03 +0000 UTC to 2028-02-17 15:03:04 +0000 UTC (now=2026-02-17 15:08:54.509848 +0000 UTC))" 2026-02-17T15:08:54.512824234Z I0217 15:08:54.510249 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340913\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340912\" (2026-02-17 14:08:32 +0000 UTC to 2027-02-17 14:08:32 +0000 UTC (now=2026-02-17 15:08:54.51020034 +0000 UTC))" 2026-02-17T15:08:54.512824234Z I0217 15:08:54.510295 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-17T15:08:54.512824234Z I0217 15:08:54.510335 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-17T15:08:54.512824234Z I0217 15:08:54.510370 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:08:54.512824234Z I0217 15:08:54.512786 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-17T15:08:54.512963218Z I0217 15:08:54.512886 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-17T15:08:54.514903195Z I0217 15:08:54.514684 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-17T15:08:54.604467084Z I0217 15:08:54.604358 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:08:54.604467084Z I0217 15:08:54.604419 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:08:54.604518925Z I0217 15:08:54.604428 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:08:54.604772421Z I0217 15:08:54.604711 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-17 14:51:46 +0000 UTC to 2026-02-18 14:51:46 +0000 UTC (now=2026-02-17 15:08:54.604665218 +0000 UTC))" 2026-02-17T15:08:54.604961266Z I0217 15:08:54.604926 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:03 +0000 UTC to 2028-02-17 15:03:04 +0000 UTC (now=2026-02-17 15:08:54.604907734 +0000 UTC))" 2026-02-17T15:08:54.605149031Z I0217 15:08:54.605107 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340913\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340912\" (2026-02-17 14:08:32 +0000 UTC to 2027-02-17 14:08:32 +0000 UTC (now=2026-02-17 15:08:54.605084318 +0000 UTC))" 2026-02-17T15:08:54.605294904Z I0217 15:08:54.605259 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:44:42 +0000 UTC to 2036-02-15 14:44:42 +0000 UTC (now=2026-02-17 15:08:54.605241993 +0000 UTC))" 2026-02-17T15:08:54.605294904Z I0217 15:08:54.605287 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2026-02-18 14:51:47 +0000 UTC (now=2026-02-17 15:08:54.605275774 +0000 UTC))" 2026-02-17T15:08:54.605329665Z I0217 15:08:54.605305 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:08:54.605293104 +0000 UTC))" 2026-02-17T15:08:54.605340296Z I0217 15:08:54.605327 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:08:54.605316505 +0000 UTC))" 2026-02-17T15:08:54.605351696Z I0217 15:08:54.605344 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:51:45 +0000 UTC to 2036-02-15 14:51:45 +0000 UTC (now=2026-02-17 15:08:54.605332575 +0000 UTC))" 2026-02-17T15:08:54.605376306Z I0217 15:08:54.605360 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-17 14:51:46 +0000 UTC to 2026-02-18 14:51:46 +0000 UTC (now=2026-02-17 15:08:54.605350806 +0000 UTC))" 2026-02-17T15:08:54.605664403Z I0217 15:08:54.605613 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:03 +0000 UTC to 2028-02-17 15:03:04 +0000 UTC (now=2026-02-17 15:08:54.605587511 +0000 UTC))" 2026-02-17T15:08:54.605844898Z I0217 15:08:54.605786 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340913\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340912\" (2026-02-17 14:08:32 +0000 UTC to 2027-02-17 14:08:32 +0000 UTC (now=2026-02-17 15:08:54.605765176 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000000340415145102315037503 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-jrdqm2026-02-17T15:07:18.482130027Z Copying system trust bundle 2026-02-17T15:07:18.550959897Z W0217 15:07:18.550874 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-17T15:07:18.551167162Z I0217 15:07:18.551128 1 observer_polling.go:159] Starting file observer 2026-02-17T15:07:18.551650735Z I0217 15:07:18.551623 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:07:18.551700096Z I0217 15:07:18.551666 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:07:18.552038094Z I0217 15:07:18.552012 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:08.152219138Z I0217 15:08:08.152102 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2026-02-17T15:08:08.152308991Z W0217 15:08:08.152269 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://172.30.0.1:443/apis/apps/v1/namespaces/openshift-authentication-operator/replicasets/authentication-operator-755d954778": context canceled 2026-02-17T15:08:08.152918536Z I0217 15:08:08.152845 1 builder.go:304] cluster-authentication-operator version - 2026-02-17T15:08:08.153702865Z I0217 15:08:08.153637 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:08:08.423803747Z F0217 15:08:08.423700 1 cmd.go:182] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json0000640000000000000000000002102015145102315030174 0ustar0000000000000000{"metadata":{"name":"authentication-operator-755d954778-jrdqm","generateName":"authentication-operator-755d954778-","namespace":"openshift-authentication-operator","uid":"e9b3f722-fb34-4ff5-b28b-fc24f43d85ae","resourceVersion":"8511","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"app":"authentication-operator","pod-template-hash":"755d954778"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.24/23\"],\"mac_address\":\"0a:58:0a:80:00:18\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.24/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.24\"\n ],\n \"mac\": \"0a:58:0a:80:00:18\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-755d954778","uid":"fa2b069e-8fed-48a9-93c8-7eb3c35d350c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-7nzlr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.32_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-7nzlr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:18Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:18Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.24","podIPs":[{"ip":"10.128.0.24"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-17T15:08:08Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0217 15:07:18.550874 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0217 15:07:18.551128 1 observer_polling.go:159] Starting file observer\nI0217 15:07:18.551623 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.551666 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.552012 1 observer_polling.go:159] Starting file observer\nI0217 15:08:08.152102 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller.\nW0217 15:08:08.152269 1 builder.go:272] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/apis/apps/v1/namespaces/openshift-authentication-operator/replicasets/authentication-operator-755d954778\": context canceled\nI0217 15:08:08.152845 1 builder.go:304] cluster-authentication-operator version -\nI0217 15:08:08.153637 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0217 15:08:08.423700 1 cmd.go:182] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-02-17T15:07:18Z","finishedAt":"2026-02-17T15:08:08Z","containerID":"cri-o://2e491cb15463a078f03468285bf55e7f054cca1c528834a6f29b9effbdeb75f4"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","containerID":"cri-o://e6c4e604cd376c77d1ad67bda0d96a444c6b00840760cb0d36d61ad455656dd0","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7nzlr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003527315145102315020643 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:25Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-5c696dbdcd to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-6b56bd877c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c696dbdcd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-6b56bd877c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-588944557d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-588944557d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-588944557d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:42Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:42Z","reason":"SuccessfulCreate","message":"Created job collect-profiles-29522340","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c696dbdcd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"collect-profiles-29522340-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-6b56bd877c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-588944557d-kjh2v","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: collect-profiles-29522340-8cp6h","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:46Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:46Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-5c696dbdcd-t7n5b","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:46Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-6b56bd877c-tk8xm","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:48Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:48Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-588944557d-kjh2v to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-6b56bd877c-tk8xm to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.16/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 14.438s (14.438s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 14.829s (14.829s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 14.875s (14.875s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"LeaderElection","message":"package-server-manager-5c696dbdcd-t7n5b_60269097-2ec7-4e51-82ec-75bf11f805fe became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:39Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:08:55Z","reason":"LeaderElection","message":"package-server-manager-5c696dbdcd-t7n5b_89ef9d5d-9c2a-45bd-8192-30be90f5459e became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:17Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:40Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:41Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-67d4dbd88b-szr25","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:41Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:41Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-67d4dbd88b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:41Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:41Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.66/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:42Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:42Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.71/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-route-controller-manager.json0000640000000000000000000002117415145102315020365 0ustar0000000000000000{"items":[{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-69bd477586-66ml6 to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-69bd477586-66ml6","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-69bd477586 to 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:16Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:16Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-6965bd7478-x8mdg","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-69bd477586-66ml6","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-69bd477586 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-6965bd7478 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:20Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:24Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-6965bd7478-x8mdg to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38\"","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-6965bd7478-x8mdg","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-6965bd7478 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-6978b88779-vp5tv","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-6978b88779 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:43Z","reason":"LeaderElection","message":"route-controller-manager-6965bd7478-x8mdg_67984cca-b8c9-4433-936b-028a9fc58064 became leader","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38\" in 6.097s (6.097s including waiting). Image size: 481921522 bytes.","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:44Z","reason":"Killing","message":"Stopping container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:44Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.40:8443/healthz\": dial tcp 10.128.0.40:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:44Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.40:8443/healthz\": dial tcp 10.128.0.40:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:48Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.52/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:03:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38\" already present on machine","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:04:22Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:04:23Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:04:50Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.52:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:04:50Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.52:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:05:19Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.52:8443/healthz\": dial tcp 10.128.0.52:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:05:19Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.52:8443/healthz\": dial tcp 10.128.0.52:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:05:19Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.52:8443/healthz\": dial tcp 10.128.0.52:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:05:29Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.52:8443/healthz\": dial tcp 10.128.0.52:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"LeaderElection","message":"route-controller-manager-6978b88779-vp5tv_6de57360-0f8f-4daa-a944-ec19dfe53d10 became leader","type":"Normal"}]}events/openshift-controller-manager.json0000640000000000000000000002712615145102315017234 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-dc99ff586 to 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:02:59Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-dc99ff586-qjjb5 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:02:59Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-dc99ff586-qjjb5","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:02:59Z","reason":"FailedCreate","message":"Error creating: pods \"controller-manager-dc99ff586-\" is forbidden: error looking up service account openshift-controller-manager/openshift-controller-manager-sa: serviceaccount \"openshift-controller-manager-sa\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-6956dbf788-5r68h","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : configmap \"config\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-6956dbf788 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-dc99ff586 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-dc99ff586-qjjb5","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-ca-bundles\" : configmap \"openshift-global-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:00Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:01Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:01Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:02Z","reason":"FailedScheduling","message":"skip schedule deleting pod: openshift-controller-manager/controller-manager-6956dbf788-5r68h","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:02Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-6956dbf788-5r68h","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-6956dbf788 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:02Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:02Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-6fcbb7f9bd-gdt9b","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-6fcbb7f9bd to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:03Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-6fcbb7f9bd-gdt9b to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-67d67c799d-b9bj6","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-6fcbb7f9bd-gdt9b","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-67d67c799d to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-6fcbb7f9bd to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:19Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-67d67c799d-b9bj6 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee\"","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee\" in 14.081s (14.081s including waiting). Image size: 553036394 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"LeaderElection","message":"controller-manager-67d67c799d-b9bj6 became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-67d67c799d-b9bj6","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-b9c8fdfbc-rh9v2","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-b9c8fdfbc to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-67d67c799d to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:40Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:41Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.38:8443/healthz\": dial tcp 10.128.0.38:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:41Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.38:8443/healthz\": dial tcp 10.128.0.38:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-b9c8fdfbc-rh9v2 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:44Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.51/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:03:44Z","reason":"LeaderElection","message":"controller-manager-b9c8fdfbc-rh9v2 became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:06:53Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:06:53Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:07:13Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:07:13Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.51:8443/healthz\": dial tcp 10.128.0.51:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:07:17Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:07:17Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:07:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-17T15:08:56Z","reason":"LeaderElection","message":"controller-manager-b9c8fdfbc-rh9v2 became leader","type":"Normal"}]}events/openshift-controller-manager-operator.json0000640000000000000000000007433715145102315021073 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T14:56:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-controller-manager-operator-5f5f84757d to 1","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T14:56:35Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-5f5f84757d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-5f5f84757d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"SuccessfulCreate","message":"Created pod: openshift-controller-manager-operator-5f5f84757d-dsfkk","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-dsfkk to master-0","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"LeaderElection","message":"openshift-controller-manager-operator-5f5f84757d-dsfkk_a4020b0d-4828-4bc0-be49-7233c59d8f1b became leader","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to BuildCSIVolumes=true","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"build\": map[string]any{\n+ \t\t\"buildDefaults\": map[string]any{\"resources\": map[string]any{}},\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e45a7281a6\"...),\n+ \t\t},\n+ \t},\n+ \t\"controllers\": []any{\n+ \t\tstring(\"openshift.io/build\"), string(\"openshift.io/build-config-change\"),\n+ \t\tstring(\"openshift.io/builder-rolebindings\"),\n+ \t\tstring(\"openshift.io/builder-serviceaccount\"),\n+ \t\tstring(\"-openshift.io/default-rolebindings\"), string(\"openshift.io/deployer\"),\n+ \t\tstring(\"openshift.io/deployer-rolebindings\"),\n+ \t\tstring(\"openshift.io/deployer-serviceaccount\"),\n+ \t\tstring(\"openshift.io/deploymentconfig\"), string(\"openshift.io/image-import\"),\n+ \t\tstring(\"openshift.io/image-puller-rolebindings\"),\n+ \t\tstring(\"openshift.io/image-signature-import\"),\n+ \t\tstring(\"openshift.io/image-trigger\"), string(\"openshift.io/ingress-ip\"),\n+ \t\tstring(\"openshift.io/ingress-to-route\"),\n+ \t\tstring(\"openshift.io/origin-namespace\"), ...,\n+ \t},\n+ \t\"deployer\": map[string]any{\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:45836e9b83\"...),\n+ \t\t},\n+ \t},\n+ \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n+ \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftcontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-route-controller-manager\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ConfigMapCreateFailed","message":"Failed to create configmap/openshift-service-ca-n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/openshift-global-ca -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"DeploymentCreated","message":"Created Deployment.apps/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"DeploymentCreateFailed","message":"Failed to create Deployment.apps/route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/route-controller-manager-sa -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ServiceCreated","message":"Created Service/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-controller-manager-sa -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ServiceCreated","message":"Created Service/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/openshift-global-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ConfigMapCreated","message":"Created configmap/openshift-service-ca-n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"DeploymentCreated","message":"Created Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.openshift-global-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"All is well\" to \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \" to \"All is well\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing changed from Unknown to True (\"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\"),Available changed from Unknown to False (\"Available: no pods available on any node.\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\" to \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:38Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:38Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:09:01Z","reason":"BackOff","message":"Back-off restarting failed container openshift-controller-manager-operator in pod openshift-controller-manager-operator-5f5f84757d-dsfkk_openshift-controller-manager-operator(c7ed6ff7-56ba-4806-9e09-b8ae6d79cfda)","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:09:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:09:16Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-17T15:09:16Z","reason":"Started","message":"Started container openshift-controller-manager-operator","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001313115145102315015430 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:15Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-6578c4d554-6jl9n to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6578c4d554 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:15Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6578c4d554-6jl9n","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:16Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-6578c4d554-6jl9n","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6bd884947c-tdlbn","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6bd884947c to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-6578c4d554 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:19Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-6bd884947c-tdlbn to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:35Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" in 14.263s (14.263s including waiting). Image size: 584205881 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:40Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[-]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa failed: reason withheld\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:40Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000010247315145102315017271 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T14:56:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-6d4655d9cf to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T14:56:35Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-6d4655d9cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-6d4655d9cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:00:43Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-6d4655d9cf-5f5g9","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9 to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"LeaderElection","message":"openshift-apiserver-operator-6d4655d9cf-5f5g9_9f0f58c0-7dd4-4d2c-972b-01827ed5e736 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:09Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.32\"}] to [{\"operator\" \"4.18.32\"} {\"openshift-apiserver\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:08:49Z","reason":"BackOff","message":"Back-off restarting failed container openshift-apiserver-operator in pod openshift-apiserver-operator-6d4655d9cf-5f5g9_openshift-apiserver-operator(af61bda0-c7b4-489d-a671-eaa5299942fe)","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:09:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:09:03Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:09:03Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007556215145102315020203 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T14:56:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-7485d55966 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T14:56:34Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-7485d55966-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-7485d55966-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-7485d55966-wcpf8","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:00:46Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8 to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-7485d55966-wcpf8_bb273c86-1924-4a1f-a542-258ee34aa707 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:23Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:24Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:27Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:32Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:32Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:33Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:38Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:44Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:50Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:53Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:53Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:08:48Z","reason":"BackOff","message":"Back-off restarting failed container kube-scheduler-operator-container in pod openshift-kube-scheduler-operator-7485d55966-wcpf8_openshift-kube-scheduler-operator(2b167b7b-2280-4c82-ac78-71c57aebe503)","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:09:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:09:01Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:09:01Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000516015145102315016335 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:16Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:16Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:16Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:25Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:39Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:39Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012567215145102315022016 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T14:56:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-78ff47c7c5 to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T14:56:33Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:00:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-78ff47c7c5-xvzq9","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-xvzq9 to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"LeaderElection","message":"kube-controller-manager-operator-78ff47c7c5-xvzq9_09a1f497-e2ba-46b6-8a0f-433c36b96ec0 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-2clbh\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-2clbh\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:19Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:24Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:27Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:31Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:32Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:33Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.13:57741-\u003e172.30.0.10:53: read: connection refused\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.13:57741-\u003e172.30.0.10:53: read: connection refused\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:43Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:45Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-controller-manager-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:53Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:03:54Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:09:04Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-78ff47c7c5-xvzq9_openshift-kube-controller-manager-operator(553d4535-9985-47e2-83ee-8fcfb6035e7b)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:09:17Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:09:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-17T15:09:17Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000002326715145102315020162 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:03:50Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:05:22Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_d5655115-c223-42ed-a93d-9d609e55c901_0(9033bd2a10a5aa2000f2e305ee22c191997b00eae1490177ec947aa0a1252cff): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"9033bd2a10a5aa2000f2e305ee22c191997b00eae1490177ec947aa0a1252cff\" Netns:\"/var/run/netns/2766612a-a335-4bdc-94a4-bd48079be634\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=9033bd2a10a5aa2000f2e305ee22c191997b00eae1490177ec947aa0a1252cff;K8S_POD_UID=d5655115-c223-42ed-a93d-9d609e55c901\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/d5655115-c223-42ed-a93d-9d609e55c901]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:06:23Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_d5655115-c223-42ed-a93d-9d609e55c901_0(d0a1d11a0a2d2c2561d3d10071017aa5fc4d3755b5c0966e48c3e368098ee733): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"d0a1d11a0a2d2c2561d3d10071017aa5fc4d3755b5c0966e48c3e368098ee733\" Netns:\"/var/run/netns/3d0983f6-5926-494a-b7e7-8e345122a0c6\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=d0a1d11a0a2d2c2561d3d10071017aa5fc4d3755b5c0966e48c3e368098ee733;K8S_POD_UID=d5655115-c223-42ed-a93d-9d609e55c901\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/d5655115-c223-42ed-a93d-9d609e55c901]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:36Z","reason":"Created","message":"Created container: kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:36Z","reason":"Started","message":"Started container kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:36Z","reason":"Created","message":"Created container: cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:36Z","reason":"Started","message":"Started container cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:37Z","reason":"Created","message":"Created container: kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:37Z","reason":"Started","message":"Started container kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:37Z","reason":"Created","message":"Created container: kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:37Z","reason":"Started","message":"Started container kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:49Z","reason":"ProbeError","message":"Startup probe error: Get \"https://localhost:10357/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:49Z","reason":"Unhealthy","message":"Startup probe failed: Get \"https://localhost:10357/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"LeaderElection","message":"master-0_6805b4b3-e7e1-48cb-a7d6-a4ff3715a212 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"ControlPlaneTopology","message":"unable to get control plane topology, using HA cluster values for leader election: infrastructures.config.openshift.io \"cluster\" is forbidden: User \"system:kube-controller-manager\" cannot get resource \"infrastructures\" in API group \"config.openshift.io\" at the cluster scope","type":"Warning"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215145102315016355 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:03:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000021273015145102315020213 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T14:56:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-54984b6678 to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T14:56:40Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-54984b6678-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-54984b6678-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-54984b6678-p5mdv","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.19/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"LeaderElection","message":"kube-apiserver-operator-54984b6678-p5mdv_8b52e755-206f-4827-a7e2-b327c86a7e48 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Progressing changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreateFailed","message":"Failed to create Secret/bound-service-account-signing-key -n openshift-kube-apiserver: secrets \"bound-service-account-signing-key\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:08Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:33Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:35Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:09:00Z","reason":"BackOff","message":"Back-off restarting failed container kube-apiserver-operator in pod kube-apiserver-operator-54984b6678-p5mdv_openshift-kube-apiserver-operator(e259b5a1-837b-4cde-85f7-cd5781af08bd)","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:09:13Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:09:13Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:09:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001242715145102315014356 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.37/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:54Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 1","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:54Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:23Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:23Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:38Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:38Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:51Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:51Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:56Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:56Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:58Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000004157215145102315016212 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T14:56:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-67bf55ccdd to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T14:56:35Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-67bf55ccdd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-67bf55ccdd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:00:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-67bf55ccdd-pjm6n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.12/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"LeaderElection","message":"etcd-operator-67bf55ccdd-pjm6n_5649cc5b-33fc-4a78-9e2b-2c538f842147 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"DefragControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:07:53Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:07:53Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:09:08Z","reason":"BackOff","message":"Back-off restarting failed container etcd-operator in pod etcd-operator-67bf55ccdd-pjm6n_openshift-etcd-operator(f2546ffc-8d0a-4010-a3bd-9e69b6dbea40)","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:09:19Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:09:19Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:09:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443415145102315016554 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:25Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-865765995-c58rq to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:25Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-865765995-c58rq","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-865765995 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.41/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" in 6.088s (6.088s including waiting). Image size: 500175306 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:44Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:44Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015145102315015100 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:03:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:03:38Z","reason":"SuccessfulCreate","message":"Created pod: router-default-864ddd5f56-g8w2f","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-864ddd5f56 to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000023211215145102315020302 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T14:56:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-755d954778 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T14:56:36Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-755d954778-jrdqm","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-755d954778-jrdqm to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" in 1.149s (1.149s including waiting). Image size: 508050651 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"LeaderElection","message":"authentication-operator-755d954778-jrdqm_f33a88bc-e211-4cb3-ba23-73187e0e1c33 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-ddq7l\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-ddq7l\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:31Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:06:59Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.24:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:06:59Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.24:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:58Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.24:8443/healthz\": dial tcp 10.128.0.24:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:58Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.24:8443/healthz\": dial tcp 10.128.0.24:8443: connect: connection refused","type":"Warning"}]}events/openshift-config-managed.json0000640000000000000000000000061015145102315016265 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-17T15:03:38Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-17T15:03:38Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003477315145102304014611 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":338,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015145102304014066 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000005202615145102271014534 0ustar0000000000000000Feb 17 15:09:08.439920 master-0 kubenswrapper[8018]: E0217 15:09:08.439827 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"etcd-operator\" with CrashLoopBackOff: \"back-off 20s restarting failed container=etcd-operator pod=etcd-operator-67bf55ccdd-pjm6n_openshift-etcd-operator(f2546ffc-8d0a-4010-a3bd-9e69b6dbea40)\"" pod="openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n" podUID="f2546ffc-8d0a-4010-a3bd-9e69b6dbea40" Feb 17 15:09:12.097570 master-0 kubenswrapper[8018]: E0217 15:09:12.097485 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2ac9a5d3-569e-4434-839e-691eacbe13df" containerName="extract-utilities" Feb 17 15:09:12.097570 master-0 kubenswrapper[8018]: E0217 15:09:12.097537 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="d5655115-c223-42ed-a93d-9d609e55c901" containerName="installer" Feb 17 15:09:12.097967 master-0 kubenswrapper[8018]: E0217 15:09:12.097575 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2994de0-1535-423a-90ce-019043cd4b9d" containerName="extract-content" Feb 17 15:09:12.097967 master-0 kubenswrapper[8018]: E0217 15:09:12.097609 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2994de0-1535-423a-90ce-019043cd4b9d" containerName="registry-server" Feb 17 15:09:12.097967 master-0 kubenswrapper[8018]: E0217 15:09:12.097642 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2994de0-1535-423a-90ce-019043cd4b9d" containerName="extract-utilities" Feb 17 15:09:12.097967 master-0 kubenswrapper[8018]: E0217 15:09:12.097679 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2ac9a5d3-569e-4434-839e-691eacbe13df" containerName="extract-content" Feb 17 15:09:12.097967 master-0 kubenswrapper[8018]: E0217 15:09:12.097716 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2ac9a5d3-569e-4434-839e-691eacbe13df" containerName="registry-server" Feb 17 15:09:34.398491 master-0 kubenswrapper[8018]: E0217 15:09:34.398038 8018 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 17 15:09:34.398491 master-0 kubenswrapper[8018]: E0217 15:09:34.398157 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls podName:f0c5ca70-1706-4858-adcb-b421ba1e422b nodeName:}" failed. No retries permitted until 2026-02-17 15:09:34.898126176 +0000 UTC m=+407.650469226 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls") pod "machine-approver-6c46d95f74-nsmfx" (UID: "f0c5ca70-1706-4858-adcb-b421ba1e422b") : secret "machine-approver-tls" not found Feb 17 15:09:34.903821 master-0 kubenswrapper[8018]: E0217 15:09:34.903736 8018 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 17 15:09:34.903900 master-0 kubenswrapper[8018]: E0217 15:09:34.903866 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls podName:f0c5ca70-1706-4858-adcb-b421ba1e422b nodeName:}" failed. No retries permitted until 2026-02-17 15:09:35.903833942 +0000 UTC m=+408.656177022 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls") pod "machine-approver-6c46d95f74-nsmfx" (UID: "f0c5ca70-1706-4858-adcb-b421ba1e422b") : secret "machine-approver-tls" not found Feb 17 15:09:35.917138 master-0 kubenswrapper[8018]: E0217 15:09:35.916183 8018 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 17 15:09:35.917138 master-0 kubenswrapper[8018]: E0217 15:09:35.916279 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls podName:f0c5ca70-1706-4858-adcb-b421ba1e422b nodeName:}" failed. No retries permitted until 2026-02-17 15:09:37.916254809 +0000 UTC m=+410.668597889 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls") pod "machine-approver-6c46d95f74-nsmfx" (UID: "f0c5ca70-1706-4858-adcb-b421ba1e422b") : secret "machine-approver-tls" not found Feb 17 15:09:36.525047 master-0 kubenswrapper[8018]: E0217 15:09:36.525012 8018 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:36.525110 master-0 kubenswrapper[8018]: E0217 15:09:36.525092 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert podName:c97d328c-95b6-4511-aa90-531ab42b9653 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:37.025067996 +0000 UTC m=+409.777411086 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-595c8f9ff-p8hbc" (UID: "c97d328c-95b6-4511-aa90-531ab42b9653") : secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:37.031406 master-0 kubenswrapper[8018]: E0217 15:09:37.030711 8018 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:37.031406 master-0 kubenswrapper[8018]: E0217 15:09:37.030861 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert podName:c97d328c-95b6-4511-aa90-531ab42b9653 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:38.030826294 +0000 UTC m=+410.783169384 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-595c8f9ff-p8hbc" (UID: "c97d328c-95b6-4511-aa90-531ab42b9653") : secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:37.842204 master-0 kubenswrapper[8018]: E0217 15:09:37.842160 8018 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Feb 17 15:09:37.842290 master-0 kubenswrapper[8018]: E0217 15:09:37.842251 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/6b7d1adb-b23b-4702-be7d-27e818e8fd63-samples-operator-tls podName:6b7d1adb-b23b-4702-be7d-27e818e8fd63 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:38.342227784 +0000 UTC m=+411.094570874 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/6b7d1adb-b23b-4702-be7d-27e818e8fd63-samples-operator-tls") pod "cluster-samples-operator-f8cbff74c-hr9g4" (UID: "6b7d1adb-b23b-4702-be7d-27e818e8fd63") : secret "samples-operator-tls" not found Feb 17 15:09:37.943793 master-0 kubenswrapper[8018]: E0217 15:09:37.943710 8018 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 17 15:09:37.943880 master-0 kubenswrapper[8018]: E0217 15:09:37.943843 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls podName:f0c5ca70-1706-4858-adcb-b421ba1e422b nodeName:}" failed. No retries permitted until 2026-02-17 15:09:41.943813519 +0000 UTC m=+414.696156599 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls") pod "machine-approver-6c46d95f74-nsmfx" (UID: "f0c5ca70-1706-4858-adcb-b421ba1e422b") : secret "machine-approver-tls" not found Feb 17 15:09:38.046358 master-0 kubenswrapper[8018]: E0217 15:09:38.045874 8018 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:38.046580 master-0 kubenswrapper[8018]: E0217 15:09:38.046556 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert podName:c97d328c-95b6-4511-aa90-531ab42b9653 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:40.04652078 +0000 UTC m=+412.798863840 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-595c8f9ff-p8hbc" (UID: "c97d328c-95b6-4511-aa90-531ab42b9653") : secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:38.350908 master-0 kubenswrapper[8018]: E0217 15:09:38.350749 8018 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Feb 17 15:09:38.350908 master-0 kubenswrapper[8018]: E0217 15:09:38.350838 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/6b7d1adb-b23b-4702-be7d-27e818e8fd63-samples-operator-tls podName:6b7d1adb-b23b-4702-be7d-27e818e8fd63 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:39.350815521 +0000 UTC m=+412.103158581 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/6b7d1adb-b23b-4702-be7d-27e818e8fd63-samples-operator-tls") pod "cluster-samples-operator-f8cbff74c-hr9g4" (UID: "6b7d1adb-b23b-4702-be7d-27e818e8fd63") : secret "samples-operator-tls" not found Feb 17 15:09:39.366736 master-0 kubenswrapper[8018]: E0217 15:09:39.366647 8018 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Feb 17 15:09:39.366832 master-0 kubenswrapper[8018]: E0217 15:09:39.366752 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c8646e5c-c2ce-48e6-b757-58044769f479-cert podName:c8646e5c-c2ce-48e6-b757-58044769f479 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:39.866722723 +0000 UTC m=+412.619065813 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/c8646e5c-c2ce-48e6-b757-58044769f479-cert") pod "cluster-autoscaler-operator-67fd9768b5-6dzpr" (UID: "c8646e5c-c2ce-48e6-b757-58044769f479") : secret "cluster-autoscaler-operator-cert" not found Feb 17 15:09:39.367076 master-0 kubenswrapper[8018]: E0217 15:09:39.367028 8018 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Feb 17 15:09:39.367133 master-0 kubenswrapper[8018]: E0217 15:09:39.367105 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/6b7d1adb-b23b-4702-be7d-27e818e8fd63-samples-operator-tls podName:6b7d1adb-b23b-4702-be7d-27e818e8fd63 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:41.367083722 +0000 UTC m=+414.119426772 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/6b7d1adb-b23b-4702-be7d-27e818e8fd63-samples-operator-tls") pod "cluster-samples-operator-f8cbff74c-hr9g4" (UID: "6b7d1adb-b23b-4702-be7d-27e818e8fd63") : secret "samples-operator-tls" not found Feb 17 15:09:39.874660 master-0 kubenswrapper[8018]: E0217 15:09:39.874540 8018 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Feb 17 15:09:39.874660 master-0 kubenswrapper[8018]: E0217 15:09:39.874637 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c8646e5c-c2ce-48e6-b757-58044769f479-cert podName:c8646e5c-c2ce-48e6-b757-58044769f479 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:40.874613063 +0000 UTC m=+413.626956143 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/c8646e5c-c2ce-48e6-b757-58044769f479-cert") pod "cluster-autoscaler-operator-67fd9768b5-6dzpr" (UID: "c8646e5c-c2ce-48e6-b757-58044769f479") : secret "cluster-autoscaler-operator-cert" not found Feb 17 15:09:40.078026 master-0 kubenswrapper[8018]: E0217 15:09:40.077799 8018 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:40.078026 master-0 kubenswrapper[8018]: E0217 15:09:40.077859 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert podName:c97d328c-95b6-4511-aa90-531ab42b9653 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:44.077844783 +0000 UTC m=+416.830187833 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-595c8f9ff-p8hbc" (UID: "c97d328c-95b6-4511-aa90-531ab42b9653") : secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:40.890335 master-0 kubenswrapper[8018]: E0217 15:09:40.889808 8018 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Feb 17 15:09:40.890335 master-0 kubenswrapper[8018]: E0217 15:09:40.889904 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c8646e5c-c2ce-48e6-b757-58044769f479-cert podName:c8646e5c-c2ce-48e6-b757-58044769f479 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:42.88987911 +0000 UTC m=+415.642222160 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/c8646e5c-c2ce-48e6-b757-58044769f479-cert") pod "cluster-autoscaler-operator-67fd9768b5-6dzpr" (UID: "c8646e5c-c2ce-48e6-b757-58044769f479") : secret "cluster-autoscaler-operator-cert" not found Feb 17 15:09:41.396532 master-0 kubenswrapper[8018]: E0217 15:09:41.395921 8018 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Feb 17 15:09:41.396532 master-0 kubenswrapper[8018]: E0217 15:09:41.395994 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/6b7d1adb-b23b-4702-be7d-27e818e8fd63-samples-operator-tls podName:6b7d1adb-b23b-4702-be7d-27e818e8fd63 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:45.395980815 +0000 UTC m=+418.148323865 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/6b7d1adb-b23b-4702-be7d-27e818e8fd63-samples-operator-tls") pod "cluster-samples-operator-f8cbff74c-hr9g4" (UID: "6b7d1adb-b23b-4702-be7d-27e818e8fd63") : secret "samples-operator-tls" not found Feb 17 15:09:42.008548 master-0 kubenswrapper[8018]: E0217 15:09:42.008484 8018 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 17 15:09:42.008632 master-0 kubenswrapper[8018]: E0217 15:09:42.008612 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls podName:f0c5ca70-1706-4858-adcb-b421ba1e422b nodeName:}" failed. No retries permitted until 2026-02-17 15:09:50.008584746 +0000 UTC m=+422.760927796 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/f0c5ca70-1706-4858-adcb-b421ba1e422b-machine-approver-tls") pod "machine-approver-6c46d95f74-nsmfx" (UID: "f0c5ca70-1706-4858-adcb-b421ba1e422b") : secret "machine-approver-tls" not found Feb 17 15:09:42.218860 master-0 kubenswrapper[8018]: E0217 15:09:42.215874 8018 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 17 15:09:42.218860 master-0 kubenswrapper[8018]: E0217 15:09:42.215928 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/655e4000-0ad4-4349-8c31-e0c952e4be30-machine-api-operator-tls podName:655e4000-0ad4-4349-8c31-e0c952e4be30 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:42.715914095 +0000 UTC m=+415.468257145 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/655e4000-0ad4-4349-8c31-e0c952e4be30-machine-api-operator-tls") pod "machine-api-operator-bd7dd5c46-g6fgz" (UID: "655e4000-0ad4-4349-8c31-e0c952e4be30") : secret "machine-api-operator-tls" not found Feb 17 15:09:42.720877 master-0 kubenswrapper[8018]: E0217 15:09:42.720530 8018 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 17 15:09:42.720877 master-0 kubenswrapper[8018]: E0217 15:09:42.720587 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/655e4000-0ad4-4349-8c31-e0c952e4be30-machine-api-operator-tls podName:655e4000-0ad4-4349-8c31-e0c952e4be30 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:43.720570046 +0000 UTC m=+416.472913096 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/655e4000-0ad4-4349-8c31-e0c952e4be30-machine-api-operator-tls") pod "machine-api-operator-bd7dd5c46-g6fgz" (UID: "655e4000-0ad4-4349-8c31-e0c952e4be30") : secret "machine-api-operator-tls" not found Feb 17 15:09:42.922935 master-0 kubenswrapper[8018]: E0217 15:09:42.922567 8018 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Feb 17 15:09:42.922935 master-0 kubenswrapper[8018]: E0217 15:09:42.922614 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c8646e5c-c2ce-48e6-b757-58044769f479-cert podName:c8646e5c-c2ce-48e6-b757-58044769f479 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:46.922599177 +0000 UTC m=+419.674942217 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/c8646e5c-c2ce-48e6-b757-58044769f479-cert") pod "cluster-autoscaler-operator-67fd9768b5-6dzpr" (UID: "c8646e5c-c2ce-48e6-b757-58044769f479") : secret "cluster-autoscaler-operator-cert" not found Feb 17 15:09:43.732901 master-0 kubenswrapper[8018]: E0217 15:09:43.732583 8018 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 17 15:09:43.732901 master-0 kubenswrapper[8018]: E0217 15:09:43.732686 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/655e4000-0ad4-4349-8c31-e0c952e4be30-machine-api-operator-tls podName:655e4000-0ad4-4349-8c31-e0c952e4be30 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:45.732664585 +0000 UTC m=+418.485007645 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/655e4000-0ad4-4349-8c31-e0c952e4be30-machine-api-operator-tls") pod "machine-api-operator-bd7dd5c46-g6fgz" (UID: "655e4000-0ad4-4349-8c31-e0c952e4be30") : secret "machine-api-operator-tls" not found Feb 17 15:09:44.137863 master-0 kubenswrapper[8018]: E0217 15:09:44.137729 8018 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 17 15:09:44.137863 master-0 kubenswrapper[8018]: E0217 15:09:44.137857 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert podName:c97d328c-95b6-4511-aa90-531ab42b9653 nodeName:}" failed. No retries permitted until 2026-02-17 15:09:52.137828762 +0000 UTC m=+424.890171822 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/c97d328c-95b6-4511-aa90-531ab42b9653-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-595c8f9ff-p8hbc" (UID: "c97d328c-95b6-4511-aa90-531ab42b9653") : secret "cloud-credential-operator-serving-cert" not foundaggregated/unused_machine_configs_count.json0000640000000000000000000000004115145102271020125 0ustar0000000000000000{"unused_machineconfigs_count":9}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715145102271017531 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-17T15:03:36Z","not_after":"2028-02-17T15:03:37Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-17T15:03:37Z","not_after":"2028-02-17T15:03:38Z","controllers":[]}]config/running_containers.json0000640000000000000000000000751015145102271015306 0ustar0000000000000000{"images":{"0":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","1":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","10":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","11":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","12":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","13":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","14":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","15":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","16":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","17":"registry.redhat.io/redhat/community-operator-index:v4.18","18":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","19":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","2":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","20":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","21":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","22":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","23":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","24":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","25":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","26":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","27":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","28":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","29":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","3":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","30":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","31":"registry.redhat.io/redhat/redhat-operator-index:v4.18","32":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","33":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","34":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","35":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","36":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","37":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","38":"registry.redhat.io/redhat/certified-operator-index:v4.18","39":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","4":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","40":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","41":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","42":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","43":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","44":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","45":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","5":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","6":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","7":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","8":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","9":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39"},"containers":{"2026-02":{"0":9,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":1,"16":1,"17":1,"18":1,"19":1,"2":7,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"5":4,"6":2,"7":2,"8":2,"9":2}}}config/pod/openshift-service-ca-operator/service-ca-operator-5dc4688546-sg75p.json0000640000000000000000000001615515145102271026116 0ustar0000000000000000{"metadata":{"name":"service-ca-operator-5dc4688546-sg75p","generateName":"service-ca-operator-5dc4688546-","namespace":"openshift-service-ca-operator","uid":"65d9f008-7777-48fe-85fe-9d54a7bbcea9","resourceVersion":"9533","creationTimestamp":"2026-02-17T15:00:43Z","labels":{"app":"service-ca-operator","pod-template-hash":"5dc4688546"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-operator-5dc4688546","uid":"205bf319-8062-45a2-a167-5ca60164b75e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"service-ca-operator-config","defaultMode":420}},{"name":"kube-api-access-9g7zh","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","command":["service-ca-operator","operator"],"args":["--config=/var/run/configmaps/config/operator-config.yaml","-v=2"],"env":[{"name":"CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-9g7zh","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca-operator","serviceAccount":"service-ca-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c7"},"runAsUser":1001,"runAsGroup":1001,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"service-ca-operator","state":{"running":{"startedAt":"2026-02-17T15:09:16Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.083992 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.084127 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.085025 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:07:18.085054 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:07:18.085393 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.310274 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps service-ca-operator-5dc4688546)\nI0217 15:08:18.310516 1 builder.go:304] service-ca-operator version -\nI0217 15:08:18.311392 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0217 15:08:48.736975 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-service-ca-operator/leases/service-ca-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:17Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://29887de882fd8a3a22e87156cef67aeb00ac494c3b04550882c5426a5a9c25ec"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","containerID":"cri-o://50d813c00eb4ee20e7e4a0770f94362bd89a3e9a431dc0d899c42e55cc8f993e","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-9g7zh","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}operator-controller-controller-manager-85c9b89969-4n2ls.json0000640000000000000000000002473715145102271032155 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-85c9b89969-4n2ls","generateName":"operator-controller-controller-manager-85c9b89969-","namespace":"openshift-operator-controller","uid":"50c51fe2-32aa-430f-8da0-7cf3b9519131","resourceVersion":"8499","creationTimestamp":"2026-02-17T15:03:23Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"85c9b89969"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.39/23\"],\"mac_address\":\"0a:58:0a:80:00:27\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.39/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.39\"\n ],\n \"mac\": \"0a:58:0a:80:00:27\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-85c9b89969","uid":"56f910fd-e781-4e88-945e-ef7db37a6fb5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-8g48f","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-8g48f","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-8g48f","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:25Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:25Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.39","podIPs":[{"ip":"10.128.0.39"}],"startTime":"2026-02-17T15:03:23Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-17T15:03:37Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://d2819b5ec7544398c667e332b7fb3d2d85cf71bbbb7f6160fcca20bd85436f17","started":true,"volumeMounts":[{"name":"kube-api-access-8g48f","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-17T15:07:18Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"community-operators\" reconcileID=\"11c194e1-cc47-44f3-b40b-131d278247db\"\nI0217 15:03:54.673250 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"11c194e1-cc47-44f3-b40b-131d278247db\"\nI0217 15:03:54.725653 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"a2b00170-18b3-49a9-bb82-7d557c8fc2e6\"\nI0217 15:03:54.725706 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"a2b00170-18b3-49a9-bb82-7d557c8fc2e6\"\nE0217 15:04:37.764968 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0217 15:05:37.768368 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0217 15:05:50.761721 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0217 15:05:50.761828 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0217 15:05:50.761879 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\n","startedAt":"2026-02-17T15:03:37Z","finishedAt":"2026-02-17T15:05:50Z","containerID":"cri-o://c1a7bb61a118b809395aec1f33f427a3425dcd9dc3136b6302e76b1e5de619e7"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","containerID":"cri-o://e78076928670aead1e74a90bfe18141b9748ba5b397af907cd88d6d09ee87278","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8g48f","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-6fcf4c966-l24cg.json0000640000000000000000000002326015145102271025253 0ustar0000000000000000{"metadata":{"name":"network-operator-6fcf4c966-l24cg","generateName":"network-operator-6fcf4c966-","namespace":"openshift-network-operator","uid":"4fd2c79d-1e10-4f09-8a33-c66598abc99a","resourceVersion":"8936","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"name":"network-operator","pod-template-hash":"6fcf4c966"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-6fcf4c966","uid":"ff677323-64f7-4613-96d8-f5f955272944","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-mgwfb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67d1623cf33e4a5ecaa5ec7f1dae3af4e0e0478489b3a628de2062dca1473c7e"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67d61d27aa46f8c1f49f2f691ebeec6a8465c1506c83e876415fcf6be19c2d77"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae9731fa23b96fe0a08e198d4cab6bb4e4b81a006a45b1e68948ffcac4e0bf9c"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7862391b6b069f985d3ba652ff80f29fedce94493a013b8e464e2d7bde964da4"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a913cef121c9a6c3ddc57b01fc807bb042e5a903489c05f99e6e2da9e6ec0b98"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mgwfb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:01:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:01:12Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:00:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:01:12Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-02-17T15:09:02Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:06:43.894719 1 cmd.go:250] Using service-serving-cert provided certificates\nI0217 15:06:43.894897 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:06:43.895350 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.073995 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps network-operator-6fcf4c966)\nI0217 15:08:18.075079 1 builder.go:298] network-operator version 4.18.0-202601171847.p2.gf63a7ff.assembly.stream.el9-f63a7ff-f63a7ffb316c9ca4359210ff5ea2c003dbe2d6a9\nF0217 15:08:48.686173 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-operator/leases/network-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:06:43Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://6d9a92eb2e644f956d98f7c0c8da65baf4f27d9eba13c8c64b77e173d1e323c4"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","containerID":"cri-o://3d42744bc55ffdd0ef5a58be1827ed2cd005681379705cfa9b05d7d0639649ee","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mgwfb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-xwftw.json0000640000000000000000000002463315145102271026050 0ustar0000000000000000{"metadata":{"name":"network-node-identity-xwftw","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"7c6b911d-8db2-48e8-bce9-d4bcde1f55a0","resourceVersion":"8472","creationTimestamp":"2026-02-17T15:01:49Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"69d96c74cb","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"4fa3be14-143d-49dc-9cd4-736a268175da","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-cpq86","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cpq86","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cpq86","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:01:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:01:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:01:49Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-02-17T15:05:35Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"kmprm\"} reason=\"CSRApproved\"\nI0217 15:02:20.649012 1 approver.go:230] Finished syncing CSR csr-kmprm for master-0 node in 9.953799ms\nI0217 15:02:20.649251 1 approver.go:230] Finished syncing CSR csr-kmprm for unknown node in 107.532µs\nI0217 15:02:20.658882 1 approver.go:230] Finished syncing CSR csr-kmprm for unknown node in 105.763µs\nI0217 15:02:25.976202 1 recorder.go:104] \"CSR \\\"csr-t2trz\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-t2trz\"} reason=\"CSRApproved\"\nI0217 15:02:25.982084 1 approver.go:230] Finished syncing CSR csr-t2trz for master-0 node in 6.366063ms\nI0217 15:02:25.982214 1 approver.go:230] Finished syncing CSR csr-t2trz for unknown node in 67.412µs\nI0217 15:02:25.995937 1 approver.go:230] Finished syncing CSR csr-t2trz for unknown node in 79.642µs\nE0217 15:04:23.016662 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE0217 15:04:38.016907 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0217 15:04:38.016970 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0217 15:04:53.017381 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0217 15:04:53.017598 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-02-17T15:02:07Z","finishedAt":"2026-02-17T15:04:53Z","containerID":"cri-o://55d3b1057ac7a6ad2c1bad42aa92f8880f4cec28c612f7db8db1627fa4374902"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://be8f29548cec98725a9fe2f2e764da4e1fd8b3547c172ac45765b13bbbf51c52","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cpq86","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-02-17T15:02:07Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://c29a0045f98de0eaf7f82dbc4073260459c891479eaa5f5615d8d6bc94e6b3a2","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cpq86","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615145102271026255 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"f67aa67a-084a-48ce-96ba-6bddbd414671","resourceVersion":"3961","creationTimestamp":"2026-02-17T15:02:01Z","annotations":{"kubernetes.io/config.hash":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.mirror":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.seen":"2026-02-17T15:00:08.620331632Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"0094b69a-edfe-40b7-b76a-0bab854d0992","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:02:47Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-17T15:00:13Z","finishedAt":"2026-02-17T15:00:13Z","containerID":"cri-o://b7bba1848d8e5849cd7385799efab8edc5b4febf88a3e8ee8efae1fdf0ca6b20"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://b7bba1848d8e5849cd7385799efab8edc5b4febf88a3e8ee8efae1fdf0ca6b20","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-17T15:00:55Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0217 15:00:28.142659 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0217 15:00:28.142774 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0217 15:00:28.143847 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-02-17T15:00:28Z","finishedAt":"2026-02-17T15:00:28Z","containerID":"cri-o://7ee371ff3fea654567b16adfcbd47a6ebbd168a2f1e33c4562b559cfe498844a"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://518b836a67d98b0cf5a2e8d843574e61038c30a6058fcd6123417dc9c4975d78","started":true}],"qosClass":"Burstable"}}kube-storage-version-migrator-operator-cd5474998-tckph.json0000640000000000000000000001641415145102271035651 0ustar0000000000000000config/pod/openshift-kube-storage-version-migrator-operator{"metadata":{"name":"kube-storage-version-migrator-operator-cd5474998-tckph","generateName":"kube-storage-version-migrator-operator-cd5474998-","namespace":"openshift-kube-storage-version-migrator-operator","uid":"0c58265d-32fb-4cf0-97d8-6c9a5d37fad9","resourceVersion":"9515","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"kube-storage-version-migrator-operator","pod-template-hash":"cd5474998"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-storage-version-migrator-operator-cd5474998","uid":"670f9aec-70ec-47b8-a557-8c52a8094674","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"kube-api-access-gxjqf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-storage-version-migrator-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","command":["cluster-kube-storage-version-migrator-operator","start"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gxjqf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1001,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-storage-version-migrator-operator","serviceAccount":"kube-storage-version-migrator-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c14"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:14Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:14Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-storage-version-migrator-operator","state":{"running":{"startedAt":"2026-02-17T15:09:14Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.057210 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.057440 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.061636 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.302213 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-storage-version-migrator-operator-cd5474998)\nI0217 15:08:18.302752 1 builder.go:304] openshift-kube-storage-version-migrator-operator version 4.18.0-202601170513.p2.g59ba356.assembly.stream.el9-59ba356-59ba356f50ea3128905ffdb7137f868aa0588bab\nF0217 15:08:48.718708 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-storage-version-migrator-operator/leases/openshift-kube-storage-version-migrator-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:17Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://f39a2941da8acf9c022d9ee8fee7bd53fe9f2ec2201845d6f776f31736d87bf2"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","containerID":"cri-o://8c3de091b26b63488ddbcb0fd31c122edf5d7a587d35c169e265f4e9d06987b5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gxjqf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-c588d8cb4-nclxg.json0000640000000000000000000002431015145102271025406 0ustar0000000000000000{"metadata":{"name":"ingress-operator-c588d8cb4-nclxg","generateName":"ingress-operator-c588d8cb4-","namespace":"openshift-ingress-operator","uid":"22a30079-d7fc-49cf-882e-1c5022cb5bf6","resourceVersion":"8477","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"name":"ingress-operator","pod-template-hash":"c588d8cb4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-c588d8cb4","uid":"7060cec7-da2b-4cae-9183-2108c1843b28","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-bh874","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-bh874","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-bh874","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:18Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:18Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-02-17T15:07:17Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Pod ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0217 15:05:37.668372 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0217 15:05:37.668622 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.IngressController ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0217 15:05:37.668326 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Service ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0217 15:05:37.668659 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Secret ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-17T15:05:37.669Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-02-17T15:05:37.669Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\n2026-02-17T15:05:37.669Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-02-17T15:05:37.669Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-02-17T15:05:37.670Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-02-17T15:03:36Z","finishedAt":"2026-02-17T15:05:37Z","containerID":"cri-o://e96d7161de590628bad20a520afcf9b1363c2b5f7629d556a379b4230528784f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","containerID":"cri-o://4f4889e4fc034bdf89049f32d3bbe8147db247c0bdabc918e6164722403d46c8","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-bh874","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-17T15:03:37Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://d93b40433fb9724e1f5467feb33fb43b6ecba885ae346a6f96e425da8156ece5","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-bh874","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-74b6595c6d-q4766.json0000640000000000000000000001403715145102271030037 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-74b6595c6d-q4766","generateName":"csi-snapshot-controller-74b6595c6d-","namespace":"openshift-cluster-storage-operator","uid":"129dba1e-73df-4ea4-96c0-3eba78d568ba","resourceVersion":"8924","creationTimestamp":"2026-02-17T15:02:58Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"74b6595c6d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.28/23\"],\"mac_address\":\"0a:58:0a:80:00:1c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.28/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.28\"\n ],\n \"mac\": \"0a:58:0a:80:00:1c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-74b6595c6d","uid":"412b8e47-40f5-4448-aa4d-523c61bf8d62","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-rbmb9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-rbmb9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000160000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsNonRoot":true,"fsGroup":1000160000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:58Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.28","podIPs":[{"ip":"10.128.0.28"}],"startTime":"2026-02-17T15:02:58Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-02-17T15:08:58Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0217 15:08:00.663910 1 feature_gate.go:387] feature gates: {map[]}\nI0217 15:08:00.664218 1 main.go:169] Version: 68a18d7e135100109ca9e677bea11f9ad9d000e5\nI0217 15:08:00.666380 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0217 15:08:30.668371 1 main.go:109] Failed to list v1 volumesnapshotcontents with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshotcontents?limit=1\": context deadline exceeded\nE0217 15:08:30.668492 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-02-17T15:08:00Z","finishedAt":"2026-02-17T15:08:30Z","containerID":"cri-o://39e5d190c1de962c17b93f9f892d9c95fb301c2b359b235051f10e8c679da55c"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","containerID":"cri-o://ef80e89f464f2fddabc8382f1aaea540a66323e02f01f8d399ba62bafcf783cc","started":true,"volumeMounts":[{"name":"kube-api-access-rbmb9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-ff6c9b66-k8xp8.json0000640000000000000000000002057515145102271031675 0ustar0000000000000000{"metadata":{"name":"cluster-node-tuning-operator-ff6c9b66-k8xp8","generateName":"cluster-node-tuning-operator-ff6c9b66-","namespace":"openshift-cluster-node-tuning-operator","uid":"071566ae-a9ae-4aa9-9dc3-38602363be72","resourceVersion":"8592","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"name":"cluster-node-tuning-operator","pod-template-hash":"ff6c9b66"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-node-tuning-operator-ff6c9b66","uid":"fa7e80df-0b2c-4a08-b793-7aebc9f437a3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-tuning-operator-tls","secret":{"secretName":"node-tuning-operator-tls","defaultMode":420}},{"name":"apiservice-cert","secret":{"secretName":"performance-addon-operator-webhook-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-hrh2k","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-node-tuning-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","command":["cluster-node-tuning-operator"],"args":["-v=0"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"RESYNC_PERIOD","value":"600"},{"name":"CLUSTER_NODE_TUNED_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-hrh2k","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"readOnlyRootFilesystem":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-node-tuning-operator","serviceAccount":"cluster-node-tuning-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c0"},"runAsUser":499,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"cluster-node-tuning-operator","state":{"running":{"startedAt":"2026-02-17T15:08:54Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"hift.io\",\"controllerKind\":\"PerformanceProfile\",\"source\":\"kind source: *v1.Profile\"}\n{\"level\":\"info\",\"ts\":\"2026-02-17T15:03:36Z\",\"msg\":\"Starting Controller\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\"}\nI0217 15:03:36.962962 1 controller.go:1443] started events processor/controller\nI0217 15:03:36.992835 1 server.go:104] starting metrics server\nI0217 15:03:37.009753 1 controller.go:653] created profile master-0 [openshift-control-plane]\n{\"level\":\"info\",\"ts\":\"2026-02-17T15:03:37Z\",\"msg\":\"Starting workers\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"worker count\":1}\nE0217 15:05:10.883130 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0217 15:06:10.884879 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io node-tuning-operator-lock)\nE0217 15:07:44.890408 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0217 15:08:36.878914 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-node-tuning-operator/leases/node-tuning-operator-lock\": context deadline exceeded\nI0217 15:08:36.879014 1 leaderelection.go:297] failed to renew lease openshift-cluster-node-tuning-operator/node-tuning-operator-lock: timed out waiting for the condition\nF0217 15:08:54.397538 1 main.go:242] manager exited with non-zero code: leader election lost\n","startedAt":"2026-02-17T15:03:36Z","finishedAt":"2026-02-17T15:08:54Z","containerID":"cri-o://8a4a98b1318c509e5f82636085aeb117a7034201fd28d56b542c5883530a6144"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","containerID":"cri-o://4c47c374b75591c1874c057cb8609aad6e1b60685643b76979aadb8e2ca53712","started":true,"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-hrh2k","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-67bc7c997f-jdfsm.json0000640000000000000000000002537515145102271026027 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-67bc7c997f-jdfsm","generateName":"catalogd-controller-manager-67bc7c997f-","namespace":"openshift-catalogd","uid":"68954d1e-2147-4465-9817-a3c04cbc19b0","resourceVersion":"8500","creationTimestamp":"2026-02-17T15:03:20Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"67bc7c997f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.36/23\"],\"mac_address\":\"0a:58:0a:80:00:24\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.36/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.36\"\n ],\n \"mac\": \"0a:58:0a:80:00:24\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-67bc7c997f","uid":"072d8a8f-5072-4cd0-9501-28538aa24660","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-4lwz4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-4lwz4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-4lwz4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:23Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:20Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:31Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:31Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.36","podIPs":[{"ip":"10.128.0.36"}],"startTime":"2026-02-17T15:03:20Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-17T15:03:22Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://2a479ec38bdea4cbd4a7adb238b324911587886dcefb4e0f842be74e764e51d4","started":true,"volumeMounts":[{"name":"kube-api-access-4lwz4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-17T15:07:18Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"eout: request did not complete within requested timeout - context deadline exceeded\n \u003e controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"04ded6c5-f757-4bcf-b87e-7de645431d5e\"\nI0217 15:05:36.810618 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"ff127877-4904-4f36-b14a-81394222c69c\"\nI0217 15:05:36.810666 1 clustercatalog_controller.go:208] \"unpack required: no cached catalog metadata found for this catalog\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"ff127877-4904-4f36-b14a-81394222c69c\"\nI0217 15:05:36.810719 1 main.go:250] \"using available authentication information for pulling image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"ff127877-4904-4f36-b14a-81394222c69c\"\nE0217 15:05:49.299051 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0217 15:06:02.287405 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0217 15:06:02.287656 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-17T15:03:23Z","finishedAt":"2026-02-17T15:06:02Z","containerID":"cri-o://e039cb4463938f81d7404a930ef7ab4b00269f6ed6b9151f252951ea9d381dc4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","containerID":"cri-o://60c37bbe21721a193105735329bdb72d13d00d18b75bdb6198c01ec145d996cc","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-4lwz4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615145102271027474 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"2b0d8d72-9fab-4f8b-8eb5-5c4514322411","resourceVersion":"6027","generation":2,"creationTimestamp":"2026-02-17T15:03:20Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/pod/openshift-cluster-version/cluster-version-operator-649c4f5445-7kdb7.json0000640000000000000000000001351015145102271026471 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-649c4f5445-7kdb7","generateName":"cluster-version-operator-649c4f5445-","namespace":"openshift-cluster-version","uid":"626c4f7a-59ee-45da-9198-05dd2c42ac42","resourceVersion":"9679","creationTimestamp":"2026-02-17T15:09:17Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"649c4f5445"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-649c4f5445","uid":"8c2ae6b8-6170-4565-b097-2454a714531b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"imagePullSecrets":[{"name":"default-dockercfg-fg558"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:17Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:18Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:18Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:17Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:09:17Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-17T15:09:18Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","containerID":"cri-o://98474fa2fe73c4db5804824208857baff7e2d6a53dfa4d32d3b7d0f00e99e897","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415145102271011020 0ustar0000000000000000ba8fa6d1-ecee-405e-a25e-db56aa7ca5f0config/version.json0000640000000000000000000000526615145102271013074 0ustar0000000000000000{"metadata":{"name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","resourceVersion":"9833","generation":2,"creationTimestamp":"2026-02-17T14:55:44Z"},"spec":{"clusterID":"ba8fa6d1-ecee-405e-a25e-db56aa7ca5f0","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","url":"https://access.redhat.com/errata/RHSA-2026:1062","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-17T14:56:08Z","completionTime":null,"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","verified":false}],"observedGeneration":2,"versionHash":"mWssvFsfzgI=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-17T14:56:08Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-17T14:56:08Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-17T14:56:08Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-17T14:56:08Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T14:56:08Z"},{"type":"Failing","status":"False","lastTransitionTime":"2026-02-17T14:56:08Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T14:56:08Z","message":"Working towards 4.18.32: 625 of 906 done (68% complete)"}],"availableUpdates":null}}config/clusteroperator/storage.json0000640000000000000000000000131215145102271016274 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"2e61eb79-2711-43f9-b380-8006de5854cf","resourceVersion":"806","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315145102271016654 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"3776dbba-58af-415e-bc1b-e00b6d619a68","resourceVersion":"5035","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:05Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:01Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:01Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307715145102271024662 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"5293f28a-a061-49c4-a9dc-aa9b15416bd9","resourceVersion":"10003","generation":1,"creationTimestamp":"2026-02-17T14:56:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:09:41Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:38Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515145102271023452 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"1bf6dc9f-cd42-4ca1-af7f-9f7c676cc5d9","resourceVersion":"8531","generation":1,"creationTimestamp":"2026-02-17T14:56:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:08:37Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115145102271022036 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"6bc6de63-b694-4d5a-a585-57c85698e14a","resourceVersion":"6737","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315145102271020300 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"045d9b56-463c-45f7-acb7-0441e0c4f621","resourceVersion":"814","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000430415145102271022424 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"4a5302a4-b2e5-4128-8d7b-9f7fed510054","resourceVersion":"7149","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:05Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:03:05Z","reason":"_NoPodsAvailable","message":"Available: no pods available on any node."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:05Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215145102271020632 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"27466ce2-93aa-4053-a9a9-7660344b5e35","resourceVersion":"8032","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:46Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"openshift-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415145102271015423 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"7de8b071-baf0-45e8-8433-01a1ea318d98","resourceVersion":"7558","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:10Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:45Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:45Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:10Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:03:10Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115145102271017062 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"aa2fc8d7-4870-455d-aa7c-94db0e8440dc","resourceVersion":"7157","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:38Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.32\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:40Z","reason":"AsExpected","message":"Cluster version is \"4.18.32\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315145102271016333 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"8242e933-c445-4414-b5be-4b9e782731d5","resourceVersion":"6979","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-17T15:01:30Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:01:19Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:01:19Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:38Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:02:43Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715145102271017026 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"571b448d-1c10-42d2-9d06-f4c9d4b76182","resourceVersion":"6673","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315145102271017123 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"a4b585ac-3b85-41dd-b016-55892cbfce5e","resourceVersion":"6701","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.32"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015145102271017475 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"0e683dd7-abc2-438f-b8b4-dadf445fe3e3","resourceVersion":"821","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000146715145102271020103 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"d656bd79-6c46-4bce-ba86-07acf2c02328","resourceVersion":"817","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415145102271017013 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"80cad6af-06d5-4344-bdc5-1bb0f687fb12","resourceVersion":"770","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315145102271022533 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"eef5d95f-ab0c-4402-9934-bb5c6acf5260","resourceVersion":"4864","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615145102271017543 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"c66a562b-66a9-4132-aa18-c6766ccdda70","resourceVersion":"6518","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:15Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715145102271021364 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"6c603bad-c35a-45c1-a392-050fc5929f72","resourceVersion":"8269","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:31Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:03:00Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715145102271017571 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"093c5535-560d-498e-9245-22b8474e35ad","resourceVersion":"6477","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:39Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:33Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:02:40Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:39Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-17T15:02:39Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534115145102271016466 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"9d85e2f7-e13f-4b22-91d2-8508acec3bbb","resourceVersion":"10207","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-02-17T15:09:44Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-02-17T15:09:44Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000456715145102271016321 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"8502ebfb-1e52-4ee1-9851-365bbd239d56","resourceVersion":"7063","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:39Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:38Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715145102271017566 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"083ba522-81e4-4cfe-b2ac-389d2245b504","resourceVersion":"811","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015145102271015560 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"38aae85a-b6f1-4355-a7b0-d671760832db","resourceVersion":"5801","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:17Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515145102271015430 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"4abeb2cc-6baa-4126-95cb-8390ecc25349","resourceVersion":"9606","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:17Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:17Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:17Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715145102271021432 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"fcee1738-0f9a-44a2-9808-8e1cd5b2965d","resourceVersion":"4861","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"csi-snapshot-controller","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515145102271021611 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"a01bfe9f-b09d-4472-bb45-77d32f70c2dd","resourceVersion":"9758","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:32Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:32Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:32Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:09:32Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215145102271016272 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"250d96eb-7210-44bb-8973-51ebd201b228","resourceVersion":"795","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615145102271017732 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"09030905-8c73-4268-b7e4-01c0416b41e0","resourceVersion":"8530","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000164415145102271020461 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"162639e6-5975-47a7-829e-238c9fe81a3a","resourceVersion":"775","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","name":""},{"group":"autoscaling.openshift.io","resource":"machineautoscalers","name":""}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000000346515145102271020061 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"a35bd9fd-5e05-4a65-bf68-0db0398efc05","resourceVersion":"786","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"pod-identity-webhook"},{"group":"apps","resource":"deployments","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","name":""},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"","resource":"serviceaccounts","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"","resource":"services","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"pod-identity-webhook"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715145102271021542 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"7b54d445-6a0f-4dd1-b705-8c2e2154b8de","resourceVersion":"805","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115145102271016573 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"f0d7bd9a-d8e3-4662-8859-f5047e8e9756","resourceVersion":"10105","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:41Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:41Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:41Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:09:41Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-17T15:09:41Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773615145102271017667 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"48eb25d5-2b4b-4b03-9305-8ffbc6ef28ba","resourceVersion":"8241","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:00Z","reason":"AsExpected","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:50Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:03:00Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:00Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"oauth-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515145102271023213 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115145102271025423 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715145102271025132 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715145102271025123 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000040415145102271022245 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515145102271026677 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115145102271023402 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115145102271023176 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115145102271025466 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615145102271025476 0ustar0000000000000000{"metadata":{"name":"edit","uid":"0153aae1-3336-4163-a363-49b1cc0a934c","resourceVersion":"7299","creationTimestamp":"2026-02-17T14:54:45Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315145102271025637 0ustar0000000000000000{"metadata":{"name":"admin","uid":"1fb756f5-14e9-4c4e-ba42-f14b5070fc6f","resourceVersion":"7306","creationTimestamp":"2026-02-17T14:54:45Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315145102271023440 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"2daf85bd-55e6-4eb1-be77-3c607c5d8d09","resourceVersion":"4230","generation":1,"creationTimestamp":"2026-02-17T15:02:58Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015145102271022043 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"aadcd42c-4aaa-4e99-ab5d-288877468c6e","resourceVersion":"4195","generation":1,"creationTimestamp":"2026-02-17T15:02:58Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}events/openshift-machine-api.json0000640000000000000000000000074315145102271015611 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-17T15:09:42Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-autoscaler-operator-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-17T15:09:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : secret \"machine-api-operator-tls\" not found","type":"Warning"}]}config/infrastructure.json0000640000000000000000000000106515145102271014460 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"72d202a4-09bb-41f6-9127-efbcb868e18e","resourceVersion":"539","generation":1,"creationTimestamp":"2026-02-17T14:55:38Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/schedulers/cluster.json0000640000000000000000000000052415145102271015221 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"e4dc6c19-1ee2-44e8-a960-8f7cee62bc01","resourceVersion":"562","generation":1,"creationTimestamp":"2026-02-17T14:55:41Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115145102271027744 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"70396571-3eb2-4dbc-ae82-217ce96c7712","resourceVersion":"6747","generation":1,"creationTimestamp":"2026-02-17T15:03:37Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"AsExpected"}]}}config/apiserver.json0000640000000000000000000000121615145102271013376 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"807fa2b2-9ee7-4b53-af89-d6f270e043ec","resourceVersion":"847","generation":1,"creationTimestamp":"2026-02-17T14:56:10Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/authentication.json0000640000000000000000000000116515145102271014420 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5f2bee39-f5ae-4e35-9636-cb354d64139a","resourceVersion":"1151","generation":1,"creationTimestamp":"2026-02-17T14:56:16Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215145102271020172 0ustar0000000000000000[]config/oauth.json0000640000000000000000000000114415145102271012516 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"3d32694a-033f-469e-942f-2f1e916e3ae1","resourceVersion":"1706","generation":1,"creationTimestamp":"2026-02-17T14:56:27Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/machineconfigpools/worker.json0000640000000000000000000000106615145102271016561 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-17T15:09:42Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10135","uid":"bd2f53b2-c8a8-4302-9fa7-524e1e3b77c3"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117315145102271016542 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-17T15:09:42Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10134","uid":"31e31006-613e-4b3c-9bbb-e88cf59939ce"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/node/master-0.json0000640000000000000000000000551415145102271013760 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"0094b69a-edfe-40b7-b76a-0bab854d0992","resourceVersion":"8554","creationTimestamp":"2026-02-17T15:00:43Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-17T15:08:51Z","lastTransitionTime":"2026-02-17T15:00:43Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-17T15:08:51Z","lastTransitionTime":"2026-02-17T15:00:43Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-17T15:08:51Z","lastTransitionTime":"2026-02-17T15:00:43Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-17T15:08:51Z","lastTransitionTime":"2026-02-17T15:02:36Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.107.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202601202224-0","containerRuntimeVersion":"cri-o://1.31.13-3.rhaos4.18.gite0b87e5.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/ingress.json0000640000000000000000000000043615145102271013053 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"41ad3130-65bd-49bf-87d4-ea9d4d6351d9","resourceVersion":"552","generation":1,"creationTimestamp":"2026-02-17T14:55:39Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/featuregate.json0000640000000000000000000000613615145102271013700 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"708aac9a-6281-41dd-9fba-d624cbc07f0f","resourceVersion":"645","generation":1,"creationTimestamp":"2026-02-17T14:56:00Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.32","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/network.json0000640000000000000000000000117015145102271013066 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"f56d25c4-e548-437c-b18d-6c09af1c9c25","resourceVersion":"3243","generation":2,"creationTimestamp":"2026-02-17T14:55:39Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115145102271025272 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"66b53f60-df1a-4b22-a31b-0be4c058c6b5","resourceVersion":"4963","generation":2,"creationTimestamp":"2026-02-17T14:56:36Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515145102271026731 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"3cb4f775-da5c-47d0-ac45-4b6ba1be74ce","resourceVersion":"6783","generation":1,"creationTimestamp":"2026-02-17T15:03:37Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"530cc9e8-1d21-4a3d-9030-6bae99c25263","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715145102271024017 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"d41531c7-1588-48ac-9407-45e80120c06e","resourceVersion":"4958","generation":2,"creationTimestamp":"2026-02-17T15:01:33Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"530cc9e8-1d21-4a3d-9030-6bae99c25263","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000164415145102271032113 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"6b2edaa6-b9b3-400c-b70a-30a233e8cff1","resourceVersion":"10108","generation":1,"creationTimestamp":"2026-02-17T15:09:41Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443}},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615145102271025117 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"561dd5f4-ddd1-4b09-83b6-3228b2e6701b","resourceVersion":"10181","generation":1,"creationTimestamp":"2026-02-17T14:56:25Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-02-17T15:09:43Z","reason":"SufficientPods","message":""}]}}config/image.json0000640000000000000000000000111715145102271012460 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"8f92d81a-5e9e-40b6-9d18-144d36df036e","resourceVersion":"1539","generation":1,"creationTimestamp":"2026-02-17T14:56:25Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/proxy.json0000640000000000000000000000031315145102271012554 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"436b951d-afb3-4463-9226-9ab4b43d905e","resourceVersion":"555","generation":1,"creationTimestamp":"2026-02-17T14:55:40Z"},"spec":{"trustedCA":{"name":""}},"status":{}}