insights-operator/gathers.json0000640000000000000000000004663515145103013015260 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":31,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":11045,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":6039,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":51,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":35,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":106,"records_count":21,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":15458,"records_count":56,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json\" was already recorded and had the fingerprint \"252e4f2dd027fe890cb7719bf1594347cd7b3a3389cb170ab2f6519c969c144e\", overwriting with the record having fingerprint \"252e4f2dd027fe890cb7719bf1594347cd7b3a3389cb170ab2f6519c969c144e\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\" was already recorded and had the fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\", overwriting with the record having fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\"","the record with the same name \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json\" was already recorded and had the fingerprint \"014101819ab4c860d6d8c679e08e6ea8b21cbd62dcb7ff4b01035dc3c7d6f01e\", overwriting with the record having fingerprint \"014101819ab4c860d6d8c679e08e6ea8b21cbd62dcb7ff4b01035dc3c7d6f01e\"","the record with the same name \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json\" was already recorded and had the fingerprint \"d0b2999cdc67ee16e7183cfe51a28434ae3dc594a3a874860ee3e8476e5a8cd3\", overwriting with the record having fingerprint \"d0b2999cdc67ee16e7183cfe51a28434ae3dc594a3a874860ee3e8476e5a8cd3\"","the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json\" was already recorded and had the fingerprint \"ee4587ba3cfbe33a24ddff36f1cb6b2848af249d9681dacface4c24c2ba0ea81\", overwriting with the record having fingerprint \"ee4587ba3cfbe33a24ddff36f1cb6b2848af249d9681dacface4c24c2ba0ea81\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\" was already recorded and had the fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\", overwriting with the record having fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log\" was already recorded and had the fingerprint \"9f04cd487b42581568b909a2144a966a4dd045054aa0adda221b9baa0b923f3a\", overwriting with the record having fingerprint \"9f04cd487b42581568b909a2144a966a4dd045054aa0adda221b9baa0b923f3a\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_current.log\" was already recorded and had the fingerprint \"cbd40dbed631df3d71eddbcde83911769d0149b5194d52e8c2d4f7b8b9c0fd3f\", overwriting with the record having fingerprint \"1f2e76777ae3910d72e3653559427455b787ab8ab2a3aa4f9c85917fb9154efc\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json\" was already recorded and had the fingerprint \"5eb5ac1fcea3c2e2df3a83dc923d4c5566d766c32ebb194a70633bbff7aa5d71\", overwriting with the record having fingerprint \"5eb5ac1fcea3c2e2df3a83dc923d4c5566d766c32ebb194a70633bbff7aa5d71\""],"warnings":["warning: the record with the same fingerprint \"252e4f2dd027fe890cb7719bf1594347cd7b3a3389cb170ab2f6519c969c144e\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json\"","warning: the record with the same fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\"","warning: the record with the same fingerprint \"014101819ab4c860d6d8c679e08e6ea8b21cbd62dcb7ff4b01035dc3c7d6f01e\" was already recorded at path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json\", recording another one with a different path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json\"","warning: the record with the same fingerprint \"d0b2999cdc67ee16e7183cfe51a28434ae3dc594a3a874860ee3e8476e5a8cd3\" was already recorded at path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json\", recording another one with a different path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json\"","warning: the record with the same fingerprint \"ee4587ba3cfbe33a24ddff36f1cb6b2848af249d9681dacface4c24c2ba0ea81\" was already recorded at path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json\", recording another one with a different path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json\"","warning: the record with the same fingerprint \"33330eaec7cb26bdfc6bdae96b22fe2dd5d0e0956663f25ee7fabf69170128a7\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\"","warning: the record with the same fingerprint \"9f04cd487b42581568b909a2144a966a4dd045054aa0adda221b9baa0b923f3a\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"5eb5ac1fcea3c2e2df3a83dc923d4c5566d766c32ebb194a70633bbff7aa5d71\" was already recorded at path \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json\", recording another one with a different path \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json\""],"panic":null},{"name":"clusterconfig/image","duration_in_ms":12,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":109,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11803,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":216,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":6,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":119,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":15464,"records_count":161,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"support_secret\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":21,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":46,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":28,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":59,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":75,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":6040,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":39,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":41,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":75,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":161,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":20,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":21,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":22,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":15,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":22,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":15,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":17,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":22.118,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515145103013017753 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515145103013021055 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000006053015145103012014231 0ustar0000000000000000{"pods":88,"imageCount":70,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:14398311b101163ddd1de78c093e161c5d3c9aac51a04e3d3d842fca6317ab0f","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:ad77d0ead8abca8b884fad3be18215dbe8b4f8f098053551e4a899298cf5c918","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:28df36269fc553eb1adba5566d6dfc258a1a74063c4cfe8b5bdd3f202591cf56","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3e90d0a6840e7f67900c763906a0628ddf209cb666c54c2dda0f4a84964a5cec","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":3,"terminalCount":1,"shapes":[{"restartAlways":false,"containers":[{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":6,"terminalCount":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":3,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]},{"restartAlways":false,"containers":[{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"gcNszUTvGLqr"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":8,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9e96b53e74d1b802c2e63544e4689c9d262e9c996902c6e8a7f3ca34b23fdd50","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c1a0aba9ead3a33353dc8a033699dfa4795f4050516677dad6ed4ac664094692","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3f08586dd67c2d3d21053a044138f1bbedceb0847f1af8c3aa76127d86135a58","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","firstArg":"Sr6QxZ9vlnXv"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstArg":"ZaBBgxOjhLhc"},{"imageID":"sha256:9899b0f08b1202d149e16f09616ee7b8f37e3cda642386d93a6d3f63d72a316b","firstCommand":"oudKofjVo8ML"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011675615145103004033734 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-67d4dbd88b-szr252026-02-17T15:10:49.599892858Z time="2026-02-17T15:10:49Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-02-17T15:10:50.641835750Z time="2026-02-17T15:10:50Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-02-17T15:10:52.788035162Z E0217 15:10:52.786640 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:10:52.788035162Z E0217 15:10:52.787159 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:10:52.789581800Z E0217 15:10:52.789533 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:10:52.789581800Z E0217 15:10:52.789559 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:10:52.789731015Z E0217 15:10:52.789559 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:14.094654996Z E0217 15:11:14.093716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:14.094654996Z E0217 15:11:14.093951 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:14.094654996Z E0217 15:11:14.094350 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:14.094654996Z E0217 15:11:14.094577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:14.095544977Z E0217 15:11:14.094809 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:22.932632213Z E0217 15:11:22.932382 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:22.941552261Z E0217 15:11:22.941501 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:26.865104612Z E0217 15:11:26.864936 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:26.865104612Z E0217 15:11:26.865032 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:26.865317897Z E0217 15:11:26.865242 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:26.865409409Z E0217 15:11:26.865380 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:26.865722937Z E0217 15:11:26.865676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:44.099541907Z E0217 15:11:44.097817 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:44.099541907Z E0217 15:11:44.098419 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:44.099541907Z E0217 15:11:44.098778 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:44.099541907Z E0217 15:11:44.099162 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:44.099617929Z E0217 15:11:44.099567 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:52.800039039Z E0217 15:11:52.799934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:52.800091310Z E0217 15:11:52.800054 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:52.800380757Z E0217 15:11:52.799951 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:52.800380757Z E0217 15:11:52.800365 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:11:52.800873179Z E0217 15:11:52.800800 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:14.108282266Z E0217 15:12:14.108180 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:14.109193169Z E0217 15:12:14.108998 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:14.109489447Z E0217 15:12:14.109364 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:14.109489447Z E0217 15:12:14.109402 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:14.109833326Z E0217 15:12:14.109746 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:22.800315762Z E0217 15:12:22.800228 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:22.800315762Z E0217 15:12:22.800270 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:22.801304258Z E0217 15:12:22.801238 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:22.801734659Z E0217 15:12:22.801666 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:22.801964555Z E0217 15:12:22.801897 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:22.915945711Z E0217 15:12:22.915863 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:22.922759446Z E0217 15:12:22.922689 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:44.119082690Z E0217 15:12:44.118876 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:44.119082690Z E0217 15:12:44.118918 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:44.119082690Z E0217 15:12:44.118927 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:44.119082690Z E0217 15:12:44.118961 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:44.119211233Z E0217 15:12:44.119078 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.771524251Z E0217 15:12:52.759963 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.771524251Z E0217 15:12:52.760050 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.771524251Z E0217 15:12:52.760298 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.771524251Z E0217 15:12:52.760421 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.771524251Z E0217 15:12:52.760585 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:14.129272640Z E0217 15:13:14.129190 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:14.129336951Z E0217 15:13:14.129296 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:14.129632559Z E0217 15:13:14.129595 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:14.133565129Z E0217 15:13:14.132612 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:14.133565129Z E0217 15:13:14.132792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.781506727Z E0217 15:13:22.780111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.781506727Z E0217 15:13:22.780376 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.781506727Z E0217 15:13:22.780546 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.781506727Z E0217 15:13:22.780697 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.781506727Z E0217 15:13:22.780851 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.917127397Z E0217 15:13:22.917029 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.924187557Z E0217 15:13:22.924118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:44.141351440Z E0217 15:13:44.141275 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:44.141351440Z E0217 15:13:44.141290 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:44.141448603Z E0217 15:13:44.141369 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:44.141448603Z E0217 15:13:44.141399 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:44.141731380Z E0217 15:13:44.141690 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.787672428Z E0217 15:13:52.787621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.787715419Z E0217 15:13:52.787698 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.787772270Z E0217 15:13:52.787758 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.787916434Z E0217 15:13:52.787889 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.788025446Z E0217 15:13:52.787997 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:14.149511493Z E0217 15:14:14.148379 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:14.149511493Z E0217 15:14:14.148986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:14.149511493Z E0217 15:14:14.149260 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:14.149621315Z E0217 15:14:14.149600 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:14.149977095Z E0217 15:14:14.149941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.767886559Z E0217 15:14:22.767805 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.768136646Z E0217 15:14:22.768077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.768327240Z E0217 15:14:22.767938 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.768785651Z E0217 15:14:22.768739 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.769034688Z E0217 15:14:22.768808 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.854075951Z E0217 15:14:22.853990 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.864243146Z E0217 15:14:22.864161 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:44.155440335Z E0217 15:14:44.155348 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:44.155526308Z E0217 15:14:44.155446 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:44.155526308Z E0217 15:14:44.155502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:44.155544318Z E0217 15:14:44.155348 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:44.155855586Z E0217 15:14:44.155748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.810547491Z E0217 15:14:52.810325 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.814960681Z E0217 15:14:52.810717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.814960681Z E0217 15:14:52.810974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.814960681Z E0217 15:14:52.811181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.823516636Z E0217 15:14:52.822308 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:15:14.165130574Z E0217 15:15:14.165012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:15:14.165130574Z E0217 15:15:14.165100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:15:14.165202126Z E0217 15:15:14.165146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:15:14.165619437Z E0217 15:15:14.165380 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:15:14.165619437Z E0217 15:15:14.165563 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000004051215145103004037117 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-t7n5b2026-02-17T15:08:55.085858253Z 2026-02-17T15:08:55Z INFO setup starting manager 2026-02-17T15:08:55.087987265Z 2026-02-17T15:08:55Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-17T15:08:55.088868977Z 2026-02-17T15:08:55Z INFO controller-runtime.metrics Starting metrics server 2026-02-17T15:08:55.089926943Z I0217 15:08:55.089873 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-17T15:08:55.090025135Z 2026-02-17T15:08:55Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-17T15:08:55.090117547Z 2026-02-17T15:08:55Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-17T15:08:55.105097316Z I0217 15:08:55.105042 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-17T15:08:55.108968520Z 2026-02-17T15:08:55Z DEBUG events package-server-manager-5c696dbdcd-t7n5b_89ef9d5d-9c2a-45bd-8192-30be90f5459e became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"b2a5ca10-b65f-41a9-bccf-69d728a477ec","apiVersion":"coordination.k8s.io/v1","resourceVersion":"8587"}, "reason": "LeaderElection"} 2026-02-17T15:08:55.109167776Z 2026-02-17T15:08:55Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-17T15:08:55.109167776Z 2026-02-17T15:08:55Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-17T15:08:55.109182086Z 2026-02-17T15:08:55Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-17T15:08:55.220079538Z 2026-02-17T15:08:55Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-17T15:08:55.222389125Z 2026-02-17T15:08:55Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-17T15:08:55.222748004Z 2026-02-17T15:08:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:08:55.222748004Z 2026-02-17T15:08:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:55.530942571Z 2026-02-17T15:08:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:55.530983642Z 2026-02-17T15:08:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:08:55.583094291Z 2026-02-17T15:08:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:08:55.583094291Z 2026-02-17T15:08:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.883110663Z 2026-02-17T15:09:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:40.883110663Z 2026-02-17T15:09:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.883110663Z 2026-02-17T15:09:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.883110663Z 2026-02-17T15:09:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:40.902860648Z 2026-02-17T15:09:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:40.902860648Z 2026-02-17T15:09:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.910914986Z 2026-02-17T15:09:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:40.910914986Z 2026-02-17T15:09:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.910973047Z 2026-02-17T15:09:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:40.911144851Z 2026-02-17T15:09:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:40.929743128Z 2026-02-17T15:09:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:40.929743128Z 2026-02-17T15:09:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.214036148Z 2026-02-17T15:09:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:41.214036148Z 2026-02-17T15:09:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.214093859Z 2026-02-17T15:09:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.214119030Z 2026-02-17T15:09:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:41.230729078Z 2026-02-17T15:09:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:41.230729078Z 2026-02-17T15:09:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.492884574Z 2026-02-17T15:09:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:41.492884574Z 2026-02-17T15:09:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.492884574Z 2026-02-17T15:09:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.492884574Z 2026-02-17T15:09:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:41.504919110Z 2026-02-17T15:09:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:41.504919110Z 2026-02-17T15:09:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.637813842Z 2026-02-17T15:09:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:09:41.637813842Z 2026-02-17T15:09:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.637870334Z 2026-02-17T15:09:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:09:41.637881504Z 2026-02-17T15:09:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:09:41.649766825Z 2026-02-17T15:09:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:09:41.649766825Z 2026-02-17T15:09:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.064821548Z 2026-02-17T15:14:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:14:41.067392152Z 2026-02-17T15:14:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.067602927Z 2026-02-17T15:14:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.067626538Z 2026-02-17T15:14:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:14:41.087435235Z 2026-02-17T15:14:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:14:41.087435235Z 2026-02-17T15:14:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.642436505Z 2026-02-17T15:14:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:14:41.642436505Z 2026-02-17T15:14:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.642536727Z 2026-02-17T15:14:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.642618389Z 2026-02-17T15:14:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:14:41.662298313Z 2026-02-17T15:14:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:14:41.662298313Z 2026-02-17T15:14:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.962372770Z 2026-02-17T15:14:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:14:41.962532454Z 2026-02-17T15:14:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.962740089Z 2026-02-17T15:14:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:41.962831221Z 2026-02-17T15:14:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:14:41.981348005Z 2026-02-17T15:14:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:14:41.981348005Z 2026-02-17T15:14:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:42.217362105Z 2026-02-17T15:14:42Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:14:42.217362105Z 2026-02-17T15:14:42Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:42.218337220Z 2026-02-17T15:14:42Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:42.218510054Z 2026-02-17T15:14:42Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:14:42.244170827Z 2026-02-17T15:14:42Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:14:42.244334441Z 2026-02-17T15:14:42Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:42.356551706Z 2026-02-17T15:14:42Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:14:42.356551706Z 2026-02-17T15:14:42Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:42.362904856Z 2026-02-17T15:14:42Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:14:42.366929337Z 2026-02-17T15:14:42Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:14:42.400712204Z 2026-02-17T15:14:42Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:14:42.401892354Z 2026-02-17T15:14:42Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415145103004035621 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-t7n5b2026-02-17T15:03:21.980861448Z W0217 15:03:21.980493 1 deprecated.go:66] 2026-02-17T15:03:21.980861448Z ==== Removed Flag Warning ====================== 2026-02-17T15:03:21.980861448Z 2026-02-17T15:03:21.980861448Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-17T15:03:21.980861448Z 2026-02-17T15:03:21.980861448Z =============================================== 2026-02-17T15:03:21.980861448Z 2026-02-17T15:03:21.981244897Z I0217 15:03:21.981191 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-17T15:03:21.982425415Z I0217 15:03:21.982397 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-17T15:03:21.982882546Z I0217 15:03:21.982826 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-17T15:03:21.983754087Z I0217 15:03:21.983707 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 package-server-manager_previous.log0000640000000000000000000004071415145103004037315 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-t7n5b2026-02-17T15:03:37.867893801Z 2026-02-17T15:03:37Z INFO setup starting manager 2026-02-17T15:03:37.870839933Z 2026-02-17T15:03:37Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-17T15:03:37.872564534Z 2026-02-17T15:03:37Z INFO controller-runtime.metrics Starting metrics server 2026-02-17T15:03:37.872564534Z 2026-02-17T15:03:37Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-17T15:03:37.872564534Z 2026-02-17T15:03:37Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-17T15:03:37.872564534Z I0217 15:03:37.871613 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-17T15:03:37.900386351Z I0217 15:03:37.900141 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-17T15:03:37.900386351Z 2026-02-17T15:03:37Z DEBUG events package-server-manager-5c696dbdcd-t7n5b_60269097-2ec7-4e51-82ec-75bf11f805fe became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"b2a5ca10-b65f-41a9-bccf-69d728a477ec","apiVersion":"coordination.k8s.io/v1","resourceVersion":"6805"}, "reason": "LeaderElection"} 2026-02-17T15:03:37.909323455Z 2026-02-17T15:03:37Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-17T15:03:37.909323455Z 2026-02-17T15:03:37Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-17T15:03:37.909323455Z 2026-02-17T15:03:37Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-17T15:03:38.041324579Z 2026-02-17T15:03:38Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-17T15:03:38.041414921Z 2026-02-17T15:03:38Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-17T15:03:38.045211303Z 2026-02-17T15:03:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:38.045227113Z 2026-02-17T15:03:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.358576326Z 2026-02-17T15:03:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.359227611Z 2026-02-17T15:03:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:38.408263266Z 2026-02-17T15:03:38Z INFO controllers.packageserver attempting to create the packageserver csv 2026-02-17T15:03:38.420570702Z 2026-02-17T15:03:38Z INFO controllers.packageserver updating csv spec 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.440535380Z 2026-02-17T15:03:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:38.453914641Z 2026-02-17T15:03:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:38.453914641Z 2026-02-17T15:03:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.465902219Z 2026-02-17T15:03:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:38.465902219Z 2026-02-17T15:03:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.465902219Z 2026-02-17T15:03:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.465902219Z 2026-02-17T15:03:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:38.509003451Z 2026-02-17T15:03:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:38.582281989Z 2026-02-17T15:03:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:38.582281989Z 2026-02-17T15:03:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:39.153517564Z 2026-02-17T15:03:39Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:39.153517564Z 2026-02-17T15:03:39Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:39.153569485Z 2026-02-17T15:03:39Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:39.153590216Z 2026-02-17T15:03:39Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:39.169793774Z 2026-02-17T15:03:39Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:39.169793774Z 2026-02-17T15:03:39Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:40.031546574Z 2026-02-17T15:03:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:03:40.031546574Z 2026-02-17T15:03:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:40.031546574Z 2026-02-17T15:03:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:03:40.031546574Z 2026-02-17T15:03:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:03:40.047492786Z 2026-02-17T15:03:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:03:40.047492786Z 2026-02-17T15:03:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:05:11.928532239Z E0217 15:05:11.928384 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-17T15:06:11.931598139Z E0217 15:06:11.931437 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-02-17T15:07:45.941241285Z E0217 15:07:45.941121 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-17T15:08:31.914836117Z 2026-02-17T15:08:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:08:31.914836117Z 2026-02-17T15:08:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.917589206Z 2026-02-17T15:08:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.919318058Z 2026-02-17T15:08:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:08:31.953859947Z 2026-02-17T15:08:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:08:31.953859947Z 2026-02-17T15:08:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.953971400Z 2026-02-17T15:08:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:08:31.953971400Z 2026-02-17T15:08:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.954127874Z 2026-02-17T15:08:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:31.954152094Z 2026-02-17T15:08:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:08:31.975996396Z 2026-02-17T15:08:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:08:31.975996396Z 2026-02-17T15:08:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:32.182648371Z 2026-02-17T15:08:32Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-17T15:08:32.182648371Z 2026-02-17T15:08:32Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:32.182648371Z 2026-02-17T15:08:32Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:32.182648371Z 2026-02-17T15:08:32Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-17T15:08:32.211548090Z 2026-02-17T15:08:32Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-17T15:08:32.211649892Z 2026-02-17T15:08:32Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-17T15:08:37.918510273Z E0217 15:08:37.918300 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-operator-lifecycle-manager/leases/packageserver-controller-lock": context deadline exceeded 2026-02-17T15:08:37.918510273Z I0217 15:08:37.918392 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition 2026-02-17T15:08:54.404938786Z 2026-02-17T15:08:54Z ERROR setup problem running manager {"error": "leader election lost"} 2026-02-17T15:08:54.404938786Z main.run 2026-02-17T15:08:54.404938786Z /build/cmd/package-server-manager/main.go:150 2026-02-17T15:08:54.404938786Z github.com/spf13/cobra.(*Command).execute 2026-02-17T15:08:54.404938786Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-02-17T15:08:54.404938786Z github.com/spf13/cobra.(*Command).ExecuteC 2026-02-17T15:08:54.404938786Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-02-17T15:08:54.404938786Z github.com/spf13/cobra.(*Command).Execute 2026-02-17T15:08:54.404938786Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-02-17T15:08:54.404938786Z main.main 2026-02-17T15:08:54.404938786Z /build/cmd/package-server-manager/main.go:43 2026-02-17T15:08:54.404938786Z runtime.main 2026-02-17T15:08:54.404938786Z /usr/lib/golang/src/runtime/proc.go:271 2026-02-17T15:08:54.404938786Z Error: leader election lost 2026-02-17T15:08:54.405010677Z encountered an error while executing the binary: leader election lost config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b.json0000640000000000000000000002340415145103004030352 0ustar0000000000000000{"metadata":{"name":"package-server-manager-5c696dbdcd-t7n5b","generateName":"package-server-manager-5c696dbdcd-","namespace":"openshift-operator-lifecycle-manager","uid":"33e819b0-5a3f-4c2d-9dc7-8b0231804cdb","resourceVersion":"9732","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"package-server-manager","pod-template-hash":"5c696dbdcd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"package-server-manager-5c696dbdcd","uid":"80b42443-90eb-46e1-8eba-e306f07119a5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"package-server-manager-serving-cert","secret":{"secretName":"package-server-manager-serving-cert","defaultMode":420}},{"name":"kube-api-access-wn8df","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://127.0.0.1:9090/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--logtostderr=true"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-wn8df","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}},{"name":"package-server-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","command":["/bin/psm","start"],"args":["--name","$(PACKAGESERVER_NAME)","--namespace","$(PACKAGESERVER_NAMESPACE)","--metrics=:9090"],"env":[{"name":"PACKAGESERVER_NAME","value":"packageserver"},{"name":"PACKAGESERVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c"},{"name":"PACKAGESERVER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"GOMEMLIMIT","value":"5MiB"}],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"kube-api-access-wn8df","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:30Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:30Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-17T15:03:21Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://2f9ba4a97ac9cd770106a84a1110df7d7052e82e019a496ab8462fc28fcb14fd","started":true,"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-wn8df","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"package-server-manager","state":{"running":{"startedAt":"2026-02-17T15:08:54Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"-manager/packageserver\"}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\tchecking to see if required RBAC exists\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\tconfimed required RBAC exists\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\tcurrently topology mode\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"highly available\": false}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\treconciliation result\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"res\": \"unchanged\"}\n2026-02-17T15:08:32Z\tINFO\tcontrollers.packageserver\tfinished request reconciliation\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\nE0217 15:08:37.918300 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-operator-lifecycle-manager/leases/packageserver-controller-lock\": context deadline exceeded\nI0217 15:08:37.918392 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition\n2026-02-17T15:08:54Z\tERROR\tsetup\tproblem running manager\t{\"error\": \"leader election lost\"}\nmain.run\n\t/build/cmd/package-server-manager/main.go:150\ngithub.com/spf13/cobra.(*Command).execute\n\t/build/vendor/github.com/spf13/cobra/command.go:985\ngithub.com/spf13/cobra.(*Command).ExecuteC\n\t/build/vendor/github.com/spf13/cobra/command.go:1117\ngithub.com/spf13/cobra.(*Command).Execute\n\t/build/vendor/github.com/spf13/cobra/command.go:1041\nmain.main\n\t/build/cmd/package-server-manager/main.go:43\nruntime.main\n\t/usr/lib/golang/src/runtime/proc.go:271\nError: leader election lost\nencountered an error while executing the binary: leader election lost\n","startedAt":"2026-02-17T15:03:37Z","finishedAt":"2026-02-17T15:08:54Z","containerID":"cri-o://76d6fd0b45765a0b596669cf9b7b85cd807449a57c73b14e34163f91a2995908"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","containerID":"cri-o://b86a492f597b80e76da870edbd5aa60b116fd208f8fcff47303644a8e0039f9b","started":true,"volumeMounts":[{"name":"kube-api-access-wn8df","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}olm-operator_current.log0000640000000000000000000005177415145103004033335 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-6b56bd877c-tk8xm2026-02-17T15:15:05.338651388Z time="2026-02-17T15:15:05Z" level=info msg="install strategy successful" csv=packageserver id=+KoXv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:05.439117788Z time="2026-02-17T15:15:05Z" level=info msg="install strategy successful" csv=packageserver id=wPG4y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:05.538652385Z time="2026-02-17T15:15:05Z" level=info msg="install strategy successful" csv=packageserver id=kFPwN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:05.639015302Z time="2026-02-17T15:15:05Z" level=info msg="install strategy successful" csv=packageserver id=N/yX+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:05.738736253Z time="2026-02-17T15:15:05Z" level=info msg="install strategy successful" csv=packageserver id=gDews namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:05.838497785Z time="2026-02-17T15:15:05Z" level=info msg="install strategy successful" csv=packageserver id=zeGBL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:05.939790356Z time="2026-02-17T15:15:05Z" level=info msg="install strategy successful" csv=packageserver id=sDX4z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.039858886Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=zPDXT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.140144502Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=64R8V namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.241328599Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=gh+1T namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.341145462Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=L1up6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.439160161Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=BmySt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.539660152Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=elB8B namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.639703361Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=Wjih2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.778163804Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=HLJ8B namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.840382885Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=HGC9b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:06.940155707Z time="2026-02-17T15:15:06Z" level=info msg="install strategy successful" csv=packageserver id=ygJqY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.038996796Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=lLG4b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.139064436Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=bccZv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.239650579Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=TNd/n namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.340946189Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=PtGhU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.438616059Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=rgR8J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.539769306Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=Pn5JH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.638937603Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=Z4qzV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.739733701Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=E49ar namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.842050497Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=VQu88 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:07.942962608Z time="2026-02-17T15:15:07Z" level=info msg="install strategy successful" csv=packageserver id=oKfJb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.039534531Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=6CLiS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.139933349Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=GCmKX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.239715492Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=w/Hi1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.339053573Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=HbwtE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.439310908Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=77101 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.539408438Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=P138X namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.639408167Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=iJoRO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.738416071Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=gEUoA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.861389334Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=30U07 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:08.939253658Z time="2026-02-17T15:15:08Z" level=info msg="install strategy successful" csv=packageserver id=WLj+6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.039097892Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=yF6+v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.139787067Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=rRJeh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.240786380Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=WZ3K5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.339789294Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=o2TTA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.441131645Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=y9lSz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.539258987Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=6JGsm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.638527166Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=EoPHH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.738749370Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=YAGHO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.839210490Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=nGB7f namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:09.938716946Z time="2026-02-17T15:15:09Z" level=info msg="install strategy successful" csv=packageserver id=nB5sF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.038974060Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=PuS/1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.139064261Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=+qZ8o namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.239385957Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=mZMNd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.339820146Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=NE3Sn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.438921742Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=qq8bg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.540007447Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=D7jHj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.639864262Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=ppeWZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.739434669Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=Cj6s9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.839548120Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=sTUZ9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:10.941225991Z time="2026-02-17T15:15:10Z" level=info msg="install strategy successful" csv=packageserver id=9lM3e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.039178698Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=dycre namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.138556040Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=YNsbT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.239855011Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=aeSSj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.339189782Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=iG+/H namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.440926494Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=lBuqc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.539671370Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=pOx06 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.640044528Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=rNkuD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.738301813Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=+kJD/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.839570952Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=JlGyc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:11.938391071Z time="2026-02-17T15:15:11Z" level=info msg="install strategy successful" csv=packageserver id=bG/NR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:12.039538558Z time="2026-02-17T15:15:12Z" level=info msg="install strategy successful" csv=packageserver id=pvGol namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:12.138813758Z time="2026-02-17T15:15:12Z" level=info msg="install strategy successful" csv=packageserver id=lAdpY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:12.238701843Z time="2026-02-17T15:15:12Z" level=info msg="install strategy successful" csv=packageserver id=61sr/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:12.339153023Z time="2026-02-17T15:15:12Z" level=info msg="install strategy successful" csv=packageserver id=BywQe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:12.439727916Z time="2026-02-17T15:15:12Z" level=info msg="install strategy successful" csv=packageserver id=rnly+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:12.539769916Z time="2026-02-17T15:15:12Z" level=info msg="install strategy successful" csv=packageserver id=EkiGO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:12.641378878Z time="2026-02-17T15:15:12Z" level=info msg="install strategy successful" csv=packageserver id=r1RVv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:12.741194306Z time="2026-02-17T15:15:12Z" level=info msg="install strategy successful" csv=packageserver id=XY119 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.076789162Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=zebRE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.087819857Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=hBwV3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.099477168Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=KBfA3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.139309641Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=9zf55 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.239269763Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=sSGle namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.340511356Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=lkz+E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.441274858Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=YT4HO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.539252081Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=wlk2E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.639613303Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=dlXBW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.740892868Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=6GOIT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.840648256Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=ES0AI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:13.940138216Z time="2026-02-17T15:15:13Z" level=info msg="install strategy successful" csv=packageserver id=RsmyV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.039494313Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=OMvWi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.139651799Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=M7fyh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.247039217Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=rKxWn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.343692706Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=76Qp3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.443991827Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=Dsq/J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.539207940Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=k27eO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.639056179Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=YOqEt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.739242096Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=eyIRy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.838724327Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=vvyQs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:14.939504179Z time="2026-02-17T15:15:14Z" level=info msg="install strategy successful" csv=packageserver id=fFq1w namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:15.039157794Z time="2026-02-17T15:15:15Z" level=info msg="install strategy successful" csv=packageserver id=4ni9O namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:15.140667354Z time="2026-02-17T15:15:15Z" level=info msg="install strategy successful" csv=packageserver id=mnONX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-17T15:15:15.241106709Z time="2026-02-17T15:15:15Z" level=info msg="install strategy successful" csv=packageserver id=Lk3yd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment collect-profiles_current.log0000640000000000000000000000052415145103004034375 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/collect-profiles-29522355-rfrsq2026-02-17T15:15:01.131886273Z time="2026-02-17T15:15:01Z" level=info msg="Successfully created configMap openshift-operator-lifecycle-manager/olm-operator-heap-jjvhp" 2026-02-17T15:15:01.158660974Z time="2026-02-17T15:15:01Z" level=info msg="Successfully created configMap openshift-operator-lifecycle-manager/catalog-operator-heap-5hxmh" collect-profiles_current.log0000640000000000000000000000037315145103004034164 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/collect-profiles-29522340-8cp6h2026-02-17T15:09:53.828095054Z time="2026-02-17T15:09:53Z" level=info msg="error verifying provided cert and key: cert file should not be empty" 2026-02-17T15:09:53.828095054Z time="2026-02-17T15:09:53Z" level=info msg="generating a new cert and key" catalog-operator_current.log0000640000000000000000000005530715145103004034541 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-588944557d-kjh2v2026-02-17T15:10:37.406675994Z time="2026-02-17T15:10:37Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=BaXRp 2026-02-17T15:10:37.406685084Z time="2026-02-17T15:10:37Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=BaXRp 2026-02-17T15:10:37.406685084Z time="2026-02-17T15:10:37Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=BaXRp 2026-02-17T15:10:38.007884604Z time="2026-02-17T15:10:38Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=BaXRp 2026-02-17T15:10:38.008009467Z time="2026-02-17T15:10:38Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-2lg56 current-pod.namespace=openshift-marketplace id=BaXRp 2026-02-17T15:10:38.008009467Z time="2026-02-17T15:10:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-2lg56 current-pod.namespace=openshift-marketplace id=BaXRp 2026-02-17T15:10:38.008124970Z time="2026-02-17T15:10:38Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=BaXRp 2026-02-17T15:10:38.008124970Z time="2026-02-17T15:10:38Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=BaXRp 2026-02-17T15:10:38.018570107Z time="2026-02-17T15:10:38Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:38.018570107Z time="2026-02-17T15:10:38Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:38.407519497Z time="2026-02-17T15:10:38Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:38.407519497Z time="2026-02-17T15:10:38Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-2lg56 current-pod.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:38.407519497Z time="2026-02-17T15:10:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-2lg56 current-pod.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:38.407519497Z time="2026-02-17T15:10:38Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=2cwMo 2026-02-17T15:10:38.407519497Z time="2026-02-17T15:10:38Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:38.407519497Z time="2026-02-17T15:10:38Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:39.007304182Z time="2026-02-17T15:10:39Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:39.007494167Z time="2026-02-17T15:10:39Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-2lg56 current-pod.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:39.007518007Z time="2026-02-17T15:10:39Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-2lg56 current-pod.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:39.007717132Z time="2026-02-17T15:10:39Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:39.007717132Z time="2026-02-17T15:10:39Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=2cwMo 2026-02-17T15:10:48.581018073Z time="2026-02-17T15:10:48Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=community-operators state.State=READY" 2026-02-17T15:10:48.581083595Z time="2026-02-17T15:10:48Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.581083595Z time="2026-02-17T15:10:48Z" level=info msg="resolving sources" id=/qdDc namespace=openshift-marketplace 2026-02-17T15:10:48.581083595Z time="2026-02-17T15:10:48Z" level=info msg="checking if subscriptions need update" id=/qdDc namespace=openshift-marketplace 2026-02-17T15:10:48.581083595Z time="2026-02-17T15:10:48Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.586425766Z time="2026-02-17T15:10:48Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=/qdDc namespace=openshift-marketplace 2026-02-17T15:10:48.590679661Z time="2026-02-17T15:10:48Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.590805444Z time="2026-02-17T15:10:48Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-t8vtc current-pod.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.590805444Z time="2026-02-17T15:10:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-t8vtc current-pod.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.590875395Z time="2026-02-17T15:10:48Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=/Jlw4 2026-02-17T15:10:48.590885376Z time="2026-02-17T15:10:48Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.590885376Z time="2026-02-17T15:10:48Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.602770587Z time="2026-02-17T15:10:48Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.602935601Z time="2026-02-17T15:10:48Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-t8vtc current-pod.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.602935601Z time="2026-02-17T15:10:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-t8vtc current-pod.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.603057634Z time="2026-02-17T15:10:48Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.603057634Z time="2026-02-17T15:10:48Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/Jlw4 2026-02-17T15:10:48.614919836Z time="2026-02-17T15:10:48Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.614919836Z time="2026-02-17T15:10:48Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.619735673Z time="2026-02-17T15:10:48Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.619936798Z time="2026-02-17T15:10:48Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-t8vtc current-pod.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.619936798Z time="2026-02-17T15:10:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-t8vtc current-pod.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.619983030Z time="2026-02-17T15:10:48Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=pAd6O 2026-02-17T15:10:48.619983030Z time="2026-02-17T15:10:48Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.620004861Z time="2026-02-17T15:10:48Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.726825023Z time="2026-02-17T15:10:48Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.726932085Z time="2026-02-17T15:10:48Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-t8vtc current-pod.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.726932085Z time="2026-02-17T15:10:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-t8vtc current-pod.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.727050528Z time="2026-02-17T15:10:48Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:48.727050528Z time="2026-02-17T15:10:48Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pAd6O 2026-02-17T15:10:49.228849688Z time="2026-02-17T15:10:49Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-marketplace state.State=READY" 2026-02-17T15:10:49.228878749Z time="2026-02-17T15:10:49Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.228878749Z time="2026-02-17T15:10:49Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.228922010Z time="2026-02-17T15:10:49Z" level=info msg="resolving sources" id=0VcRB namespace=openshift-marketplace 2026-02-17T15:10:49.228922010Z time="2026-02-17T15:10:49Z" level=info msg="checking if subscriptions need update" id=0VcRB namespace=openshift-marketplace 2026-02-17T15:10:49.235429110Z time="2026-02-17T15:10:49Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=0VcRB namespace=openshift-marketplace 2026-02-17T15:10:49.235550603Z time="2026-02-17T15:10:49Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.235688866Z time="2026-02-17T15:10:49Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.235688866Z time="2026-02-17T15:10:49Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.235717577Z time="2026-02-17T15:10:49Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=Y7DBo 2026-02-17T15:10:49.235717577Z time="2026-02-17T15:10:49Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.235725477Z time="2026-02-17T15:10:49Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.585730680Z time="2026-02-17T15:10:49Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.586005397Z time="2026-02-17T15:10:49Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.586005397Z time="2026-02-17T15:10:49Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.586110840Z time="2026-02-17T15:10:49Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.586110840Z time="2026-02-17T15:10:49Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Y7DBo 2026-02-17T15:10:49.601048766Z time="2026-02-17T15:10:49Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:49.601048766Z time="2026-02-17T15:10:49Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:49.985294601Z time="2026-02-17T15:10:49Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:49.985393073Z time="2026-02-17T15:10:49Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:49.985393073Z time="2026-02-17T15:10:49Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:49.985393073Z time="2026-02-17T15:10:49Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=CBd9S 2026-02-17T15:10:49.985393073Z time="2026-02-17T15:10:49Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:49.985393073Z time="2026-02-17T15:10:49Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:50.585689061Z time="2026-02-17T15:10:50Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:50.585840945Z time="2026-02-17T15:10:50Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:50.585840945Z time="2026-02-17T15:10:50Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:50.585999649Z time="2026-02-17T15:10:50Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:50.585999649Z time="2026-02-17T15:10:50Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=CBd9S 2026-02-17T15:10:50.605736554Z time="2026-02-17T15:10:50Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:50.605736554Z time="2026-02-17T15:10:50Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:50.987255800Z time="2026-02-17T15:10:50Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:50.987327962Z time="2026-02-17T15:10:50Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:50.987327962Z time="2026-02-17T15:10:50Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:50.987359873Z time="2026-02-17T15:10:50Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=rKkE9 2026-02-17T15:10:50.987359873Z time="2026-02-17T15:10:50Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:50.987359873Z time="2026-02-17T15:10:50Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:51.584653548Z time="2026-02-17T15:10:51Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:51.584828532Z time="2026-02-17T15:10:51Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:51.584844452Z time="2026-02-17T15:10:51Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-7dzgz current-pod.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:51.585068007Z time="2026-02-17T15:10:51Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:51.585068007Z time="2026-02-17T15:10:51Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=rKkE9 2026-02-17T15:10:54.994088445Z time="2026-02-17T15:10:54Z" level=info msg="resolving sources" id=gjBBQ namespace=openshift-ingress-canary 2026-02-17T15:10:54.994088445Z time="2026-02-17T15:10:54Z" level=info msg="checking if subscriptions need update" id=gjBBQ namespace=openshift-ingress-canary 2026-02-17T15:10:54.997672014Z time="2026-02-17T15:10:54Z" level=info msg="No subscriptions were found in namespace openshift-ingress-canary" id=gjBBQ namespace=openshift-ingress-canary 2026-02-17T15:10:55.017045338Z time="2026-02-17T15:10:55Z" level=info msg="resolving sources" id=DFrOA namespace=openshift-ingress-canary 2026-02-17T15:10:55.017045338Z time="2026-02-17T15:10:55Z" level=info msg="checking if subscriptions need update" id=DFrOA namespace=openshift-ingress-canary 2026-02-17T15:10:55.106822172Z time="2026-02-17T15:10:55Z" level=info msg="No subscriptions were found in namespace openshift-ingress-canary" id=DFrOA namespace=openshift-ingress-canary config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_current.log0000640000000000000000000006432215145103004031347 0ustar00000000000000002026-02-17T15:14:59.710312079Z I0217 15:14:59.710232 1 base_controller.go:82] Caches are synced for BackingResourceController-StaticResources 2026-02-17T15:14:59.710312079Z I0217 15:14:59.710272 1 base_controller.go:119] Starting #1 worker of BackingResourceController-StaticResources controller ... 2026-02-17T15:14:59.822951643Z I0217 15:14:59.822897 1 etcdcli_pool.go:70] creating a new cached client 2026-02-17T15:14:59.858917776Z E0217 15:14:59.858857 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.75.181:9091: connect: connection refused" 2026-02-17T15:14:59.861067049Z I0217 15:14:59.861017 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:59.886928498Z I0217 15:14:59.886847 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:14:59.888099498Z I0217 15:14:59.888035 1 base_controller.go:82] Caches are synced for etcd-StaticPodState 2026-02-17T15:14:59.888099498Z I0217 15:14:59.888087 1 base_controller.go:119] Starting #1 worker of etcd-StaticPodState controller ... 2026-02-17T15:14:59.891236486Z I0217 15:14:59.891197 1 base_controller.go:82] Caches are synced for ConfigObserver 2026-02-17T15:14:59.891236486Z I0217 15:14:59.891217 1 base_controller.go:119] Starting #1 worker of ConfigObserver controller ... 2026-02-17T15:14:59.891585345Z I0217 15:14:59.891550 1 base_controller.go:82] Caches are synced for ClusterMemberController 2026-02-17T15:14:59.891585345Z I0217 15:14:59.891576 1 base_controller.go:119] Starting #1 worker of ClusterMemberController controller ... 2026-02-17T15:14:59.891985334Z I0217 15:14:59.891936 1 base_controller.go:82] Caches are synced for GuardController 2026-02-17T15:14:59.891985334Z I0217 15:14:59.891956 1 base_controller.go:119] Starting #1 worker of GuardController controller ... 2026-02-17T15:14:59.893472372Z I0217 15:14:59.893412 1 base_controller.go:82] Caches are synced for etcd-InstallerState 2026-02-17T15:14:59.893472372Z I0217 15:14:59.893432 1 base_controller.go:119] Starting #1 worker of etcd-InstallerState controller ... 2026-02-17T15:14:59.899761500Z W0217 15:14:59.899702 1 dynamic_operator_client.go:355] .status.conditions["ClusterMemberControllerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:14:59.905557085Z I0217 15:14:59.905481 1 base_controller.go:82] Caches are synced for Installer 2026-02-17T15:14:59.905557085Z I0217 15:14:59.905508 1 base_controller.go:119] Starting #1 worker of Installer controller ... 2026-02-17T15:14:59.925814953Z I0217 15:14:59.925737 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:59.951924958Z I0217 15:14:59.951854 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:59.952367359Z I0217 15:14:59.952328 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:14:58Z","message":"EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\nScriptControllerDegraded: \"configmap/etcd-pod\": missing env var values","reason":"EtcdEndpoints_ErrorUpdatingEtcdEndpoints::EtcdMembersController_ErrorUpdatingReportEtcdMembers::ScriptController_Error","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:17Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:02:58Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:59Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:14:59.952973434Z I0217 15:14:59.952927 1 etcdcli_pool.go:70] creating a new cached client 2026-02-17T15:14:59.961824246Z I0217 15:14:59.961776 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\nScriptControllerDegraded: \"configmap/etcd-pod\": missing env var values" to "EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\nScriptControllerDegraded: \"configmap/etcd-pod\": missing env var values" 2026-02-17T15:14:59.984082655Z I0217 15:14:59.984001 1 base_controller.go:82] Caches are synced for MissingStaticPodController 2026-02-17T15:14:59.984082655Z I0217 15:14:59.984058 1 base_controller.go:119] Starting #1 worker of MissingStaticPodController controller ... 2026-02-17T15:14:59.999038680Z I0217 15:14:59.998958 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:00.036177081Z I0217 15:15:00.036115 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:00.044101790Z I0217 15:15:00.044037 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:14:58Z","message":"EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nScriptControllerDegraded: \"configmap/etcd-pod\": missing env var values","reason":"EtcdEndpoints_ErrorUpdatingEtcdEndpoints::ScriptController_Error","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:17Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:02:58Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:59Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:15:00.062605364Z I0217 15:15:00.062528 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\nScriptControllerDegraded: \"configmap/etcd-pod\": missing env var values" to "EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nScriptControllerDegraded: \"configmap/etcd-pod\": missing env var values" 2026-02-17T15:15:00.085835927Z I0217 15:15:00.085798 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:15:00.104666609Z I0217 15:15:00.104563 1 base_controller.go:82] Caches are synced for EtcdStaticResources-StaticResources 2026-02-17T15:15:00.104666609Z I0217 15:15:00.104630 1 base_controller.go:119] Starting #1 worker of EtcdStaticResources-StaticResources controller ... 2026-02-17T15:15:00.508713073Z I0217 15:15:00.508648 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:00.510251272Z I0217 15:15:00.510193 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:14:58Z","message":"EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries","reason":"EtcdEndpoints_ErrorUpdatingEtcdEndpoints","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:17Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:02:58Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:59Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:15:00.519786101Z I0217 15:15:00.519733 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nScriptControllerDegraded: \"configmap/etcd-pod\": missing env var values" to "EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries" 2026-02-17T15:15:00.884151600Z I0217 15:15:00.884040 1 request.go:700] Waited for 1.569346371s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-endpoints 2026-02-17T15:15:01.146119470Z E0217 15:15:01.146070 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.75.181:9091: connect: connection refused" 2026-02-17T15:15:01.288702997Z I0217 15:15:01.288614 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"etcd","version":"4.18.32"},{"name":"operator","version":"4.18.32"}]}} 2026-02-17T15:15:01.290560503Z I0217 15:15:01.289152 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/etcd version "etcd" changed from "" to "4.18.32" 2026-02-17T15:15:01.290560503Z I0217 15:15:01.289185 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/etcd version "operator" changed from "" to "4.18.32" 2026-02-17T15:15:01.299839886Z I0217 15:15:01.297809 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"operator","version":"4.18.32"},{"name":"etcd","version":"4.18.32"}]}} 2026-02-17T15:15:01.299839886Z I0217 15:15:01.298500 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: status.versions changed from [{"raw-internal" "4.18.32"}] to [{"raw-internal" "4.18.32"} {"etcd" "4.18.32"} {"operator" "4.18.32"}] 2026-02-17T15:15:01.299839886Z I0217 15:15:01.298536 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/etcd version "operator" changed from "" to "4.18.32" 2026-02-17T15:15:01.299839886Z I0217 15:15:01.298544 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/etcd version "etcd" changed from "" to "4.18.32" 2026-02-17T15:15:01.301346934Z E0217 15:15:01.301308 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_etcd reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"etcd\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-17T15:15:01.884602913Z I0217 15:15:01.884449 1 request.go:700] Waited for 1.779275478s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd 2026-02-17T15:15:02.095986185Z I0217 15:15:02.095878 1 etcdcertsignercontroller.go:241] skipping EtcdCertSignerController can't get current revision. Err=revision rollout in progress, can't establish current revision 2026-02-17T15:15:02.694152369Z I0217 15:15:02.694077 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:02.694513328Z I0217 15:15:02.694445 1 core.go:352] ConfigMap "openshift-etcd/etcd-endpoints" changes: {"data":{"91eb892c5ee87610":"192.168.32.10","MTkyLjE2OC4zMi4xMA":null},"metadata":{"creationTimestamp":null,"managedFields":null,"resourceVersion":null,"uid":null}} 2026-02-17T15:15:02.697487603Z I0217 15:15:02.697398 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapUpdated' Updated ConfigMap/etcd-endpoints -n openshift-etcd: 2026-02-17T15:15:02.697487603Z cause by changes in data.91eb892c5ee87610,data.MTkyLjE2OC4zMi4xMA 2026-02-17T15:15:02.705338820Z I0217 15:15:02.705277 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StartingNewRevision' new revision 2 triggered by "required configmap/etcd-endpoints has changed" 2026-02-17T15:15:02.725834453Z I0217 15:15:02.725760 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:02.728502860Z I0217 15:15:02.728434 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:15:02Z","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:17Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:02:58Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:59Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:15:02.739938827Z I0217 15:15:02.738726 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded changed from True to False ("NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found") 2026-02-17T15:15:03.084274404Z I0217 15:15:03.084019 1 request.go:700] Waited for 1.79413369s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods/etcd-master-0 2026-02-17T15:15:03.713211048Z E0217 15:15:03.712879 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.75.181:9091: connect: connection refused" 2026-02-17T15:15:04.284058207Z I0217 15:15:04.283923 1 request.go:700] Waited for 1.578670046s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps 2026-02-17T15:15:04.292362496Z I0217 15:15:04.292284 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:05.088843453Z I0217 15:15:05.088741 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-17T15:15:05.088843453Z NodeName: (string) (len=8) "master-0", 2026-02-17T15:15:05.088843453Z CurrentRevision: (int32) 1, 2026-02-17T15:15:05.088843453Z TargetRevision: (int32) 0, 2026-02-17T15:15:05.088843453Z LastFailedRevision: (int32) 0, 2026-02-17T15:15:05.088843453Z LastFailedTime: (*v1.Time)(), 2026-02-17T15:15:05.088843453Z LastFailedReason: (string) "", 2026-02-17T15:15:05.088843453Z LastFailedCount: (int) 0, 2026-02-17T15:15:05.088843453Z LastFallbackCount: (int) 0, 2026-02-17T15:15:05.088843453Z LastFailedRevisionErrors: ([]string) 2026-02-17T15:15:05.088843453Z } 2026-02-17T15:15:05.088843453Z because static pod is ready 2026-02-17T15:15:05.091433088Z W0217 15:15:05.091350 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:15:05.091433088Z W0217 15:15:05.091385 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:15:05.091433088Z W0217 15:15:05.091396 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:15:05.091433088Z W0217 15:15:05.091405 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:15:05.091433088Z W0217 15:15:05.091413 1 dynamic_operator_client.go:352] .status.conditions["StaticPodsAvailable"].reason is missing; this will eventually be fatal 2026-02-17T15:15:05.122450826Z I0217 15:15:05.122374 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NodeCurrentRevisionChanged' Updated node "master-0" from revision 0 to 1 because static pod is ready 2026-02-17T15:15:05.128644141Z I0217 15:15:05.127383 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:05.128644141Z I0217 15:15:05.127840 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:15:02Z","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:15:05Z","message":"NodeInstallerProgressing: 1 node is at revision 1\nEtcdMembersProgressing: No unstarted etcd members found","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:15:05Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:59Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:15:05.148624973Z I0217 15:15:05.148514 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Progressing changed from True to False ("NodeInstallerProgressing: 1 node is at revision 1\nEtcdMembersProgressing: No unstarted etcd members found"),Available changed from False to True ("StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1\nEtcdMembersAvailable: 1 members are available") 2026-02-17T15:15:05.483511862Z I0217 15:15:05.483420 1 request.go:700] Waited for 1.795820504s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/secrets/etcd-all-certs 2026-02-17T15:15:06.096929268Z I0217 15:15:06.096809 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/etcd-pod-2 -n openshift-etcd because it was missing 2026-02-17T15:15:06.102119718Z I0217 15:15:06.102025 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:06.484546240Z I0217 15:15:06.484408 1 request.go:700] Waited for 1.357463968s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa 2026-02-17T15:15:07.683690886Z I0217 15:15:07.683597 1 request.go:700] Waited for 1.796012437s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-pod 2026-02-17T15:15:07.909909550Z I0217 15:15:07.909780 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/etcd-endpoints-2 -n openshift-etcd because it was missing 2026-02-17T15:15:07.912193447Z I0217 15:15:07.912123 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:08.866219506Z E0217 15:15:08.865653 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.75.181:9091: connect: connection refused" 2026-02-17T15:15:08.884191137Z I0217 15:15:08.884096 1 request.go:700] Waited for 1.196542272s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/restore-etcd-pod 2026-02-17T15:15:09.096174613Z I0217 15:15:09.096087 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:09.098240216Z I0217 15:15:09.096379 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/etcd-all-bundles-2 -n openshift-etcd because it was missing 2026-02-17T15:15:10.083799704Z I0217 15:15:10.083720 1 request.go:700] Waited for 1.194854238s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-pod 2026-02-17T15:15:10.294723015Z I0217 15:15:10.294581 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/etcd-all-certs-2 -n openshift-etcd because it was missing 2026-02-17T15:15:11.084216957Z I0217 15:15:11.084130 1 request.go:700] Waited for 1.196045149s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-ca-bundle 2026-02-17T15:15:11.492952129Z I0217 15:15:11.492887 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"09bb062d-bae7-4381-bda1-2e1a1b3eb854", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 2 triggered by "required configmap/etcd-endpoints has changed" 2026-02-17T15:15:11.495867002Z I0217 15:15:11.495804 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:11.518443478Z I0217 15:15:11.518371 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:15:12.684100323Z I0217 15:15:12.683994 1 request.go:700] Waited for 1.165282044s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts 2026-02-17T15:15:13.684158134Z I0217 15:15:13.684044 1 request.go:700] Waited for 1.597374311s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-all-bundles config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-pjm6n/etcd-operator_previous.log0000640000000000000000000000302415145103004031531 0ustar00000000000000002026-02-17T15:07:18.177452357Z I0217 15:07:18.177094 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-17T15:07:18.177452357Z I0217 15:07:18.177379 1 observer_polling.go:159] Starting file observer 2026-02-17T15:07:18.177692343Z I0217 15:07:18.177643 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:07:18.177728844Z I0217 15:07:18.177697 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:07:18.178304068Z I0217 15:07:18.178249 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.310450543Z W0217 15:08:18.310368 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps etcd-operator-67bf55ccdd) 2026-02-17T15:08:18.310846634Z I0217 15:08:18.310779 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601171614.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-17T15:08:48.695656203Z F0217 15:08:48.695540 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock": context deadline exceeded config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n.json0000640000000000000000000002044415145103004024256 0ustar0000000000000000{"metadata":{"name":"etcd-operator-67bf55ccdd-pjm6n","generateName":"etcd-operator-67bf55ccdd-","namespace":"openshift-etcd-operator","uid":"f2546ffc-8d0a-4010-a3bd-9e69b6dbea40","resourceVersion":"9690","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"etcd-operator","pod-template-hash":"67bf55ccdd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-67bf55ccdd","uid":"f7b1f154-47c4-47a7-a96d-d2bb4e16f28a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-jcb68","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-jcb68","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:20Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:20Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-02-17T15:09:19Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.177094 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/\nI0217 15:07:18.177379 1 observer_polling.go:159] Starting file observer\nI0217 15:07:18.177643 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.177697 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.178249 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.310368 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps etcd-operator-67bf55ccdd)\nI0217 15:08:18.310779 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601171614.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9\nF0217 15:08:48.695540 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:18Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://47a0663eadceb8ac2b92b936021f5bf1e155eb2c91b070318a1766570bc56359"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","containerID":"cri-o://1cf423e31a88736056f1999dcd941a944e9de281f289a68cb4692796b704d37a","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-jcb68","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000003312115145103004034105 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-6bd884947c-tdlbn2026-02-17T15:03:38.880735494Z W0217 15:03:38.880205 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-17T15:03:38.880960009Z I0217 15:03:38.880923 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771340618 cert, and key in /tmp/serving-cert-426269394/serving-signer.crt, /tmp/serving-cert-426269394/serving-signer.key 2026-02-17T15:03:39.498236208Z I0217 15:03:39.497861 1 observer_polling.go:159] Starting file observer 2026-02-17T15:03:39.513899524Z I0217 15:03:39.513852 1 builder.go:304] check-endpoints version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-17T15:03:39.514692363Z I0217 15:03:39.514665 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" 2026-02-17T15:03:39.895963414Z I0217 15:03:39.895897 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-17T15:03:39.897259235Z I0217 15:03:39.897235 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-17T15:03:39.897259235Z I0217 15:03:39.897254 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-17T15:03:39.897276935Z I0217 15:03:39.897270 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-17T15:03:39.897285825Z I0217 15:03:39.897276 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-17T15:03:39.901330782Z I0217 15:03:39.901285 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-17T15:03:39.901330782Z W0217 15:03:39.901320 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:03:39.901349093Z W0217 15:03:39.901327 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-17T15:03:39.901349093Z W0217 15:03:39.901334 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-17T15:03:39.901349093Z W0217 15:03:39.901340 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-17T15:03:39.901349093Z W0217 15:03:39.901344 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-17T15:03:39.901359973Z W0217 15:03:39.901348 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-17T15:03:39.901749122Z I0217 15:03:39.901711 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-17T15:03:39.903437452Z I0217 15:03:39.903391 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:03:39.903437452Z I0217 15:03:39.903428 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:03:39.903437452Z I0217 15:03:39.903423 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:03:39.903491654Z I0217 15:03:39.903438 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:03:39.903491654Z I0217 15:03:39.903447 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:03:39.903491654Z I0217 15:03:39.903480 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:03:39.903525094Z I0217 15:03:39.903518 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:03:39.903534515Z I0217 15:03:39.903526 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:03:39.903972506Z I0217 15:03:39.903719 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" 2026-02-17T15:03:39.903972506Z I0217 15:03:39.903870 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771340618\" (2026-02-17 15:03:38 +0000 UTC to 2026-03-19 15:03:39 +0000 UTC (now=2026-02-17 15:03:39.903843783 +0000 UTC))" 2026-02-17T15:03:39.904049148Z I0217 15:03:39.904027 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340619\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340619\" (2026-02-17 14:03:39 +0000 UTC to 2027-02-17 14:03:39 +0000 UTC (now=2026-02-17 15:03:39.904003487 +0000 UTC))" 2026-02-17T15:03:39.904084998Z I0217 15:03:39.904057 1 secure_serving.go:213] Serving securely on [::]:17698 2026-02-17T15:03:39.904084998Z I0217 15:03:39.904080 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-17T15:03:39.904113819Z I0217 15:03:39.904097 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:03:39.905042491Z I0217 15:03:39.905001 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:03:39.907083000Z I0217 15:03:39.905268 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:03:39.907083000Z I0217 15:03:39.906883 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:03:39.907773316Z I0217 15:03:39.907744 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-02-17T15:03:40.004203888Z I0217 15:03:40.004153 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:03:40.004583277Z I0217 15:03:40.004559 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:44:42 +0000 UTC to 2036-02-15 14:44:42 +0000 UTC (now=2026-02-17 15:03:40.004533166 +0000 UTC))" 2026-02-17T15:03:40.004645190Z I0217 15:03:40.004608 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:03:40.004656800Z I0217 15:03:40.004636 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:03:40.004688371Z I0217 15:03:40.004674 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2026-02-18 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.004611309 +0000 UTC))" 2026-02-17T15:03:40.004749292Z I0217 15:03:40.004735 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.004719231 +0000 UTC))" 2026-02-17T15:03:40.004784713Z I0217 15:03:40.004775 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.004765532 +0000 UTC))" 2026-02-17T15:03:40.004816734Z I0217 15:03:40.004806 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:51:45 +0000 UTC to 2036-02-15 14:51:45 +0000 UTC (now=2026-02-17 15:03:40.004797593 +0000 UTC))" 2026-02-17T15:03:40.004989828Z I0217 15:03:40.004955 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771340618\" (2026-02-17 15:03:38 +0000 UTC to 2026-03-19 15:03:39 +0000 UTC (now=2026-02-17 15:03:40.004941636 +0000 UTC))" 2026-02-17T15:03:40.005111700Z I0217 15:03:40.005100 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340619\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340619\" (2026-02-17 14:03:39 +0000 UTC to 2027-02-17 14:03:39 +0000 UTC (now=2026-02-17 15:03:40.00508753 +0000 UTC))" 2026-02-17T15:03:40.005216473Z I0217 15:03:40.005205 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:44:42 +0000 UTC to 2036-02-15 14:44:42 +0000 UTC (now=2026-02-17 15:03:40.005194532 +0000 UTC))" 2026-02-17T15:03:40.005276154Z I0217 15:03:40.005248 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2026-02-18 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.005231933 +0000 UTC))" 2026-02-17T15:03:40.005310845Z I0217 15:03:40.005301 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.005291815 +0000 UTC))" 2026-02-17T15:03:40.005343996Z I0217 15:03:40.005335 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:03:40.005323915 +0000 UTC))" 2026-02-17T15:03:40.005381887Z I0217 15:03:40.005373 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:51:45 +0000 UTC to 2036-02-15 14:51:45 +0000 UTC (now=2026-02-17 15:03:40.005363846 +0000 UTC))" 2026-02-17T15:03:40.005413007Z I0217 15:03:40.005404 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-17 14:51:46 +0000 UTC to 2026-02-18 14:51:46 +0000 UTC (now=2026-02-17 15:03:40.005395037 +0000 UTC))" 2026-02-17T15:03:40.005583651Z I0217 15:03:40.005571 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-426269394/tls.crt::/tmp/serving-cert-426269394/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771340618\" (2026-02-17 15:03:38 +0000 UTC to 2026-03-19 15:03:39 +0000 UTC (now=2026-02-17 15:03:40.005559561 +0000 UTC))" 2026-02-17T15:03:40.005707714Z I0217 15:03:40.005696 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771340619\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771340619\" (2026-02-17 14:03:39 +0000 UTC to 2027-02-17 14:03:39 +0000 UTC (now=2026-02-17 15:03:40.005685294 +0000 UTC))" 2026-02-17T15:03:40.202287238Z I0217 15:03:40.202226 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:03:40.208862925Z I0217 15:03:40.208809 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-02-17T15:03:40.208862925Z I0217 15:03:40.208847 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-6bd884947c-tdlbn/openshift-apiserver_current.log0000640000000000000000000011723015145103004031114 0ustar00000000000000002026-02-17T15:14:27.845746211Z E0217 15:14:27.845684 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:27.845936047Z E0217 15:14:27.845899 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:27.846182833Z E0217 15:14:27.845806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:27.846313456Z E0217 15:14:27.846248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:27.846779757Z E0217 15:14:27.846718 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:28.832985743Z E0217 15:14:28.832879 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:28.833057085Z E0217 15:14:28.832895 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:28.833092666Z E0217 15:14:28.833060 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:28.833221739Z E0217 15:14:28.833160 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:28.833221739Z E0217 15:14:28.833179 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.309270590Z E0217 15:14:47.309188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.309423063Z E0217 15:14:47.309356 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.309588717Z E0217 15:14:47.309530 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.309721311Z E0217 15:14:47.309379 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.309863414Z E0217 15:14:47.309827 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.465872787Z E0217 15:14:47.465803 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.465922908Z E0217 15:14:47.465894 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.465981649Z E0217 15:14:47.465940 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.466057602Z E0217 15:14:47.465803 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.466160665Z E0217 15:14:47.466109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.629308886Z E0217 15:14:47.629241 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.629492941Z E0217 15:14:47.629433 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.629553832Z E0217 15:14:47.629507 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.629571613Z E0217 15:14:47.629547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.629650505Z E0217 15:14:47.629627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.664258663Z E0217 15:14:47.664174 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.664258663Z E0217 15:14:47.664200 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.664340495Z E0217 15:14:47.664295 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.664660973Z E0217 15:14:47.664618 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.667812412Z E0217 15:14:47.667746 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.741944322Z E0217 15:14:47.741898 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.742081765Z E0217 15:14:47.742044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.742098606Z E0217 15:14:47.742079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.742111066Z E0217 15:14:47.742092 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.742142957Z E0217 15:14:47.741915 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.873522962Z E0217 15:14:47.873385 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.873522962Z E0217 15:14:47.873487 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.874208809Z E0217 15:14:47.873800 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.874208809Z E0217 15:14:47.874039 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.874208809Z E0217 15:14:47.874049 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:48.661761022Z E0217 15:14:48.661630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:48.661761022Z E0217 15:14:48.661671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:48.661972358Z E0217 15:14:48.661905 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:48.662254354Z E0217 15:14:48.662189 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:48.662401418Z E0217 15:14:48.662341 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.769176243Z E0217 15:14:52.769085 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.769646834Z E0217 15:14:52.769590 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.770145507Z E0217 15:14:52.770097 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.770145507Z E0217 15:14:52.770112 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.770621819Z E0217 15:14:52.770537 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.770832074Z E0217 15:14:52.770564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.782516118Z E0217 15:14:52.779971 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.790962380Z E0217 15:14:52.790868 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.790962380Z E0217 15:14:52.790938 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.791106573Z E0217 15:14:52.791070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.791396200Z E0217 15:14:52.791339 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.791556984Z E0217 15:14:52.791502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.791656926Z E0217 15:14:52.791613 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.791686807Z E0217 15:14:52.791667 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.791773669Z E0217 15:14:52.791722 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.791856201Z E0217 15:14:52.791516 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.792069917Z E0217 15:14:52.792030 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.792209511Z E0217 15:14:52.792160 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.792209511Z E0217 15:14:52.792184 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.792354654Z E0217 15:14:52.792044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.792729094Z E0217 15:14:52.792676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.792778535Z E0217 15:14:52.792734 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.792922278Z E0217 15:14:52.792098 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.793153784Z E0217 15:14:52.792374 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.793323208Z E0217 15:14:52.792930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.803165985Z E0217 15:14:52.800966 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.815633018Z E0217 15:14:52.815558 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.815845173Z E0217 15:14:52.815812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.816051699Z E0217 15:14:52.816021 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.816303905Z E0217 15:14:52.816278 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.816353106Z E0217 15:14:52.816323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.816645183Z E0217 15:14:52.816613 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.816750086Z E0217 15:14:52.816720 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.816948471Z E0217 15:14:52.816911 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.817051733Z E0217 15:14:52.817019 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.817226188Z E0217 15:14:52.817188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.817226188Z E0217 15:14:52.817216 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.817544186Z E0217 15:14:52.817511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.817572657Z E0217 15:14:52.817557 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.817827543Z E0217 15:14:52.817775 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.817855174Z E0217 15:14:52.817821 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.818849199Z E0217 15:14:52.818806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.819479004Z E0217 15:14:52.819425 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.819761991Z E0217 15:14:52.819729 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.819975506Z E0217 15:14:52.819947 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:57.856910232Z E0217 15:14:57.856832 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:57.857135267Z E0217 15:14:57.857087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:57.857319472Z E0217 15:14:57.857260 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:57.857620249Z E0217 15:14:57.857573 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:57.857831264Z E0217 15:14:57.857784 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:58.843088936Z E0217 15:14:58.842417 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:58.843088936Z E0217 15:14:58.842567 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:58.843088936Z E0217 15:14:58.842812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:58.843088936Z E0217 15:14:58.842930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:58.843183309Z E0217 15:14:58.842422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000005626715145103004040172 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-6d4655d9cf-5f5g92026-02-17T15:14:51.641224712Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:14:51.641224712Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:14:51.641224712Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:14:51.641224712Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:14:51.641224712Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:14:51.641224712Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:14:51.641224712Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:14:51.641224712Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:14:51.641224712Z > 2026-02-17T15:14:53.441586638Z E0217 15:14:53.440312 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:53.441586638Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:14:53.441586638Z > 2026-02-17T15:14:55.238916898Z E0217 15:14:55.238855 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:55.238916898Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:14:55.238916898Z > 2026-02-17T15:14:57.041558311Z E0217 15:14:57.041434 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:57.041558311Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:14:57.041558311Z > 2026-02-17T15:14:58.786141048Z I0217 15:14:58.784535 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. 2026-02-17T15:14:58.839758153Z E0217 15:14:58.839686 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:58.839758153Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:14:58.839758153Z > 2026-02-17T15:15:00.638878068Z E0217 15:15:00.638788 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:15:00.638878068Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:15:00.638878068Z > 2026-02-17T15:15:05.507271908Z E0217 15:15:05.507200 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:15:05.507271908Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:15:05.507271908Z > 2026-02-17T15:15:06.706829695Z I0217 15:15:06.704852 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. 2026-02-17T15:15:07.087364759Z E0217 15:15:07.087250 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:15:07.087364759Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:15:07.087364759Z > 2026-02-17T15:15:08.839052994Z I0217 15:15:08.838966 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. 2026-02-17T15:15:08.886673028Z E0217 15:15:08.886578 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:15:08.886673028Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-17T15:15:08.886673028Z > openshift-apiserver-operator_previous.log0000640000000000000000000000230315145103004040342 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-6d4655d9cf-5f5g92026-02-17T15:06:43.852195732Z I0217 15:06:43.852046 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:06:43.852195732Z I0217 15:06:43.852161 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:06:43.854316725Z I0217 15:06:43.854251 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.145620768Z W0217 15:08:18.145531 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-apiserver-operator-6d4655d9cf) 2026-02-17T15:08:18.146073759Z I0217 15:08:18.146029 1 builder.go:304] openshift-apiserver-operator version - 2026-02-17T15:08:48.762245827Z F0217 15:08:48.762150 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock": context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9.json0000640000000000000000000001646515145103004030101 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-6d4655d9cf-5f5g9","generateName":"openshift-apiserver-operator-6d4655d9cf-","namespace":"openshift-apiserver-operator","uid":"af61bda0-c7b4-489d-a671-eaa5299942fe","resourceVersion":"8960","creationTimestamp":"2026-02-17T15:00:43Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"6d4655d9cf"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-6d4655d9cf","uid":"7fb4208c-481a-4441-9e7b-6ef863969d05","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-jt7w4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-jt7w4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:03Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:03Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-02-17T15:09:03Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:06:43.852046 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:06:43.852161 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:06:43.854251 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.145531 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-apiserver-operator-6d4655d9cf)\nI0217 15:08:18.146029 1 builder.go:304] openshift-apiserver-operator version -\nF0217 15:08:48.762150 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:06:43Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://398a6ec9ab16d8c9b51a94b166012be81bd6e66e2c357cd186d8526d7f9bb69c"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","containerID":"cri-o://1cfd0ad488c82b15998a7888c979dda06fa4a01761beb9e5d6d35b295908c57a","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-jt7w4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000005244315145103004042632 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-7485d55966-wcpf82026-02-17T15:13:46.073696037Z I0217 15:13:46.073621 1 base_controller.go:82] Caches are synced for TargetConfigController 2026-02-17T15:13:46.073696037Z I0217 15:13:46.073648 1 base_controller.go:119] Starting #1 worker of TargetConfigController controller ... 2026-02-17T15:13:46.173850300Z I0217 15:13:46.173741 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-17T15:13:46.180236153Z I0217 15:13:46.180166 1 base_controller.go:82] Caches are synced for kube-scheduler-InstallerState 2026-02-17T15:13:46.180236153Z I0217 15:13:46.180206 1 base_controller.go:119] Starting #1 worker of kube-scheduler-InstallerState controller ... 2026-02-17T15:13:46.180380787Z I0217 15:13:46.180328 1 base_controller.go:82] Caches are synced for kube-scheduler-StaticPodState 2026-02-17T15:13:46.180380787Z I0217 15:13:46.180368 1 base_controller.go:119] Starting #1 worker of kube-scheduler-StaticPodState controller ... 2026-02-17T15:13:46.183745283Z I0217 15:13:46.183653 1 base_controller.go:82] Caches are synced for GuardController 2026-02-17T15:13:46.183745283Z I0217 15:13:46.183688 1 base_controller.go:119] Starting #1 worker of GuardController controller ... 2026-02-17T15:13:46.184998465Z I0217 15:13:46.184914 1 base_controller.go:82] Caches are synced for Installer 2026-02-17T15:13:46.184998465Z I0217 15:13:46.184940 1 base_controller.go:119] Starting #1 worker of Installer controller ... 2026-02-17T15:13:46.273282384Z I0217 15:13:46.273166 1 base_controller.go:82] Caches are synced for MissingStaticPodController 2026-02-17T15:13:46.273282384Z I0217 15:13:46.273205 1 base_controller.go:119] Starting #1 worker of MissingStaticPodController controller ... 2026-02-17T15:13:46.372714828Z I0217 15:13:46.372634 1 request.go:700] Waited for 1.090801927s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-02-17T15:13:46.578917813Z I0217 15:13:46.578857 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:47.572986125Z I0217 15:13:47.572916 1 request.go:700] Waited for 1.387532708s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-3-master-0 2026-02-17T15:13:47.574965386Z I0217 15:13:47.574926 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-17T15:13:47.574965386Z NodeName: (string) (len=8) "master-0", 2026-02-17T15:13:47.574965386Z CurrentRevision: (int32) 0, 2026-02-17T15:13:47.574965386Z TargetRevision: (int32) 4, 2026-02-17T15:13:47.574965386Z LastFailedRevision: (int32) 0, 2026-02-17T15:13:47.574965386Z LastFailedTime: (*v1.Time)(), 2026-02-17T15:13:47.574965386Z LastFailedReason: (string) "", 2026-02-17T15:13:47.574965386Z LastFailedCount: (int) 0, 2026-02-17T15:13:47.574965386Z LastFallbackCount: (int) 0, 2026-02-17T15:13:47.574965386Z LastFailedRevisionErrors: ([]string) 2026-02-17T15:13:47.574965386Z } 2026-02-17T15:13:47.574965386Z because new revision pending 2026-02-17T15:13:47.575889359Z W0217 15:13:47.575849 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:13:47.575889359Z W0217 15:13:47.575866 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:13:47.575889359Z W0217 15:13:47.575871 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:13:47.575889359Z W0217 15:13:47.575875 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:13:47.575889359Z W0217 15:13:47.575879 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-17T15:13:47.590865613Z I0217 15:13:47.590809 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:02:58Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:15Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:02:59Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:58Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:13:47.591617661Z I0217 15:13:47.591581 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:47.602486460Z I0217 15:13:47.602216 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4" 2026-02-17T15:13:47.779016336Z I0217 15:13:47.778931 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:47.779343285Z I0217 15:13:47.779310 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-scheduler-pod-5 -n openshift-kube-scheduler because it was missing 2026-02-17T15:13:48.772145095Z I0217 15:13:48.772074 1 request.go:700] Waited for 1.175077263s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-4-master-0 2026-02-17T15:13:48.977415046Z I0217 15:13:48.977323 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:48.977880408Z I0217 15:13:48.977803 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/config-5 -n openshift-kube-scheduler because it was missing 2026-02-17T15:13:49.585202275Z I0217 15:13:49.585091 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing 2026-02-17T15:13:49.778911102Z I0217 15:13:49.778867 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:49.779272041Z I0217 15:13:49.779249 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/serviceaccount-ca-5 -n openshift-kube-scheduler because it was missing 2026-02-17T15:13:50.377363952Z I0217 15:13:50.377316 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-02-17T15:13:50.772595923Z I0217 15:13:50.772537 1 request.go:700] Waited for 1.187505761s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/openshift-kube-scheduler-master-0 2026-02-17T15:13:50.977913426Z I0217 15:13:50.977866 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:50.978368878Z I0217 15:13:50.978307 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/scheduler-kubeconfig-5 -n openshift-kube-scheduler because it was missing 2026-02-17T15:13:51.772999768Z I0217 15:13:51.772949 1 request.go:700] Waited for 1.196884701s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-02-17T15:13:52.176802508Z I0217 15:13:52.176747 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:52.177159477Z I0217 15:13:52.177126 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-5 -n openshift-kube-scheduler because it was missing 2026-02-17T15:13:52.776931782Z I0217 15:13:52.774485 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:13:52.972331731Z I0217 15:13:52.972225 1 request.go:700] Waited for 1.195504216s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-02-17T15:13:53.379109238Z I0217 15:13:53.379010 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/serving-cert-5 -n openshift-kube-scheduler because it was missing 2026-02-17T15:13:53.972448289Z I0217 15:13:53.972378 1 request.go:700] Waited for 1.18004386s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-4-master-0 2026-02-17T15:13:54.181626880Z I0217 15:13:54.181541 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-client-token-5 -n openshift-kube-scheduler because it was missing 2026-02-17T15:13:54.775194236Z I0217 15:13:54.775119 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:13:54.977764708Z I0217 15:13:54.977679 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:54.978246100Z I0217 15:13:54.978171 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 5 triggered by "required secret/localhost-recovery-client-token has changed" 2026-02-17T15:13:55.005269982Z I0217 15:13:55.005180 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:56.576120850Z I0217 15:13:56.576070 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:13:57.780952205Z I0217 15:13:57.780893 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-17T15:13:57.780952205Z NodeName: (string) (len=8) "master-0", 2026-02-17T15:13:57.780952205Z CurrentRevision: (int32) 0, 2026-02-17T15:13:57.780952205Z TargetRevision: (int32) 5, 2026-02-17T15:13:57.780952205Z LastFailedRevision: (int32) 0, 2026-02-17T15:13:57.780952205Z LastFailedTime: (*v1.Time)(), 2026-02-17T15:13:57.780952205Z LastFailedReason: (string) "", 2026-02-17T15:13:57.780952205Z LastFailedCount: (int) 0, 2026-02-17T15:13:57.780952205Z LastFallbackCount: (int) 0, 2026-02-17T15:13:57.780952205Z LastFailedRevisionErrors: ([]string) 2026-02-17T15:13:57.780952205Z } 2026-02-17T15:13:57.780952205Z because new revision pending 2026-02-17T15:13:57.782313930Z W0217 15:13:57.782262 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:13:57.782313930Z W0217 15:13:57.782277 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:13:57.782313930Z W0217 15:13:57.782282 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:13:57.782313930Z W0217 15:13:57.782285 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:13:57.782313930Z W0217 15:13:57.782289 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-17T15:13:57.806247912Z I0217 15:13:57.806179 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:02:58Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:15Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:02:59Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:58Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:13:57.806556610Z I0217 15:13:57.806530 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:13:57.816879243Z I0217 15:13:57.816777 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5" 2026-02-17T15:13:58.972839258Z I0217 15:13:58.972734 1 request.go:700] Waited for 1.158561791s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-5-master-0 2026-02-17T15:13:59.778921441Z I0217 15:13:59.778871 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-5-master-0 -n openshift-kube-scheduler because it was missing 2026-02-17T15:14:00.576164557Z I0217 15:14:00.576113 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Pending phase 2026-02-17T15:14:02.375251225Z I0217 15:14:02.375177 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Pending phase 2026-02-17T15:14:03.975947996Z I0217 15:14:03.975829 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:05.376109398Z I0217 15:14:05.376026 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:22.161322886Z I0217 15:14:22.161243 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:22.912621209Z I0217 15:14:22.910700 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:22.929999676Z I0217 15:14:22.929931 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:54.781022993Z I0217 15:14:54.780643 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-scheduler version "operator" changed from "" to "4.18.32" 2026-02-17T15:14:54.781022993Z I0217 15:14:54.780669 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-scheduler version "kube-scheduler" changed from "" to "1.31.14" 2026-02-17T15:14:54.781022993Z I0217 15:14:54.780895 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"operator","version":"4.18.32"},{"name":"kube-scheduler","version":"1.31.14"}]}} 2026-02-17T15:14:54.798344217Z I0217 15:14:54.798254 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:54.799000924Z I0217 15:14:54.798912 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"99c2fb40-62fb-4631-ae37-36af15815652", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: status.versions changed from [{"raw-internal" "4.18.32"}] to [{"raw-internal" "4.18.32"} {"operator" "4.18.32"} {"kube-scheduler" "1.31.14"}] 2026-02-17T15:14:55.173617440Z I0217 15:14:55.173539 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:55.206837023Z I0217 15:14:55.206734 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:55.975572544Z I0217 15:14:55.975502 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:57.376739728Z I0217 15:14:57.376631 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because static pod is pending 2026-02-17T15:14:57.976637584Z I0217 15:14:57.976541 1 installer_controller.go:550] "master-0" is in transition to 5, but has not made progress because static pod is pending kube-scheduler-operator-container_previous.log0000640000000000000000000000251215145103004043014 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-7485d55966-wcpf82026-02-17T15:06:43.903780134Z I0217 15:06:43.903579 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:06:43.903940378Z I0217 15:06:43.903797 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:06:43.904513842Z I0217 15:06:43.904441 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.062062692Z W0217 15:08:18.061938 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-kube-scheduler-operator-7485d55966) 2026-02-17T15:08:18.062631876Z I0217 15:08:18.062517 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601180343.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-17T15:08:48.394890388Z F0217 15:08:48.394795 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock": context deadline exceeded config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8.json0000640000000000000000000001612215145103004031652 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-7485d55966-wcpf8","generateName":"openshift-kube-scheduler-operator-7485d55966-","namespace":"openshift-kube-scheduler-operator","uid":"2b167b7b-2280-4c82-ac78-71c57aebe503","resourceVersion":"8934","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"7485d55966"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-7485d55966","uid":"d2432b2e-cc7b-48e3-a0c6-530e6489960e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:01Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:01Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-02-17T15:09:01Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:06:43.903579 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:06:43.903797 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:06:43.904441 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.061938 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-kube-scheduler-operator-7485d55966)\nI0217 15:08:18.062517 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601180343.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31\nF0217 15:08:48.394795 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:06:43Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://477671fff24fa6c32a024908ab3cc22818f79df79458186eb17cd6a91eb44b4f"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","containerID":"cri-o://dfe6ffb450b0904261ab46cf367ace40b648e6342b7e1df240b49e249ecafeaa","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-recovery-controller_current.log0000640000000000000000000001656015145103004036565 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-02-17T15:14:56.090153168Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 11443 \))" ]; do sleep 1; done' 2026-02-17T15:14:56.096404795Z ++ ss -Htanop '(' sport = 11443 ')' 2026-02-17T15:14:56.113589996Z + '[' -n '' ']' 2026-02-17T15:14:56.114740605Z + exec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-scheduler --listen=0.0.0.0:11443 -v=2 2026-02-17T15:14:56.200642410Z W0217 15:14:56.200443 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-17T15:14:56.200787883Z I0217 15:14:56.200757 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1771341296 cert, and key in /tmp/serving-cert-2503422963/serving-signer.crt, /tmp/serving-cert-2503422963/serving-signer.key 2026-02-17T15:14:56.539217072Z I0217 15:14:56.539102 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:14:56.540033272Z I0217 15:14:56.539949 1 observer_polling.go:159] Starting file observer 2026-02-17T15:14:56.540182385Z I0217 15:14:56.540138 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:14:56.540182385Z I0217 15:14:56.540158 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:14:56.545848827Z W0217 15:14:56.545764 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:56.545967651Z I0217 15:14:56.545940 1 builder.go:304] cert-recovery-controller version v0.0.0-master+$Format:%H$-$Format:%H$ 2026-02-17T15:14:56.549044018Z W0217 15:14:56.549003 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:56.549197722Z I0217 15:14:56.549168 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler/cert-recovery-controller-lock... 2026-02-17T15:14:56.549733405Z I0217 15:14:56.549696 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-scheduler", Name:"openshift-kube-scheduler", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:56.555682514Z E0217 15:14:56.555641 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.1895118634c84ceb openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:14:56.548990187 +0000 UTC m=+0.427774261,LastTimestamp:2026-02-17 15:14:56.548990187 +0000 UTC m=+0.427774261,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-02-17T15:14:56.558797303Z E0217 15:14:56.558723 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:15:03.504338170Z E0217 15:15:03.504215 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.1895118634c84ceb openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-02-17 15:14:56.548990187 +0000 UTC m=+0.427774261,LastTimestamp:2026-02-17 15:14:56.548990187 +0000 UTC m=+0.427774261,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" kube-scheduler-cert-syncer_current.log0000640000000000000000000002452215145103004035001 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-02-17T15:14:55.886287595Z I0217 15:14:55.885977 1 observer_polling.go:159] Starting file observer 2026-02-17T15:14:55.886503911Z I0217 15:14:55.886022 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-02-17T15:14:55.894863851Z W0217 15:14:55.894707 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:55.895329222Z E0217 15:14:55.895289 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:14:55.895351092Z W0217 15:14:55.895300 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:55.895416394Z E0217 15:14:55.895380 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:14:56.845756200Z W0217 15:14:56.844711 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:56.845756200Z E0217 15:14:56.844816 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:14:57.185874841Z W0217 15:14:57.185768 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:57.185874841Z E0217 15:14:57.185851 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:14:59.571087486Z W0217 15:14:59.570984 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:59.571087486Z E0217 15:14:59.571045 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:14:59.925093145Z W0217 15:14:59.925028 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:14:59.925240039Z E0217 15:14:59.925216 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:15:03.714030969Z W0217 15:15:03.713917 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:15:03.714273035Z E0217 15:15:03.714025 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:15:05.360515017Z W0217 15:15:05.360412 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:15:05.360515017Z E0217 15:15:05.360501 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-02-17T15:15:12.023169908Z W0217 15:15:12.023052 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-02-17T15:15:12.023169908Z E0217 15:15:12.023133 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" kube-scheduler_current.log0000640000000000000000000003514215145103004032545 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-02-17T15:14:55.883584367Z filter: {} 2026-02-17T15:14:55.883584367Z multiPoint: 2026-02-17T15:14:55.883584367Z enabled: 2026-02-17T15:14:55.883584367Z - name: SchedulingGates 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: PrioritySort 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: NodeUnschedulable 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: NodeName 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: TaintToleration 2026-02-17T15:14:55.883584367Z weight: 3 2026-02-17T15:14:55.883584367Z - name: NodeAffinity 2026-02-17T15:14:55.883584367Z weight: 2 2026-02-17T15:14:55.883584367Z - name: NodePorts 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: NodeResourcesFit 2026-02-17T15:14:55.883584367Z weight: 1 2026-02-17T15:14:55.883584367Z - name: VolumeRestrictions 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: NodeVolumeLimits 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: VolumeBinding 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: VolumeZone 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: PodTopologySpread 2026-02-17T15:14:55.883584367Z weight: 2 2026-02-17T15:14:55.883584367Z - name: InterPodAffinity 2026-02-17T15:14:55.883584367Z weight: 2 2026-02-17T15:14:55.883584367Z - name: DefaultPreemption 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z - name: NodeResourcesBalancedAllocation 2026-02-17T15:14:55.883584367Z weight: 1 2026-02-17T15:14:55.883584367Z - name: ImageLocality 2026-02-17T15:14:55.883584367Z weight: 1 2026-02-17T15:14:55.883584367Z - name: DefaultBinder 2026-02-17T15:14:55.883584367Z weight: 0 2026-02-17T15:14:55.883584367Z permit: {} 2026-02-17T15:14:55.883584367Z postBind: {} 2026-02-17T15:14:55.883584367Z postFilter: {} 2026-02-17T15:14:55.883584367Z preBind: {} 2026-02-17T15:14:55.883584367Z preEnqueue: {} 2026-02-17T15:14:55.883584367Z preFilter: {} 2026-02-17T15:14:55.883584367Z preScore: {} 2026-02-17T15:14:55.883584367Z queueSort: {} 2026-02-17T15:14:55.883584367Z reserve: {} 2026-02-17T15:14:55.883584367Z score: {} 2026-02-17T15:14:55.883584367Z schedulerName: default-scheduler 2026-02-17T15:14:55.883584367Z > 2026-02-17T15:14:55.889842974Z I0217 15:14:55.889779 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-02-17T15:14:55.889842974Z I0217 15:14:55.889814 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-02-17T15:14:55.894880011Z I0217 15:14:55.894775 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-17T15:14:55.894880011Z I0217 15:14:55.894830 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-17T15:14:55.894936792Z I0217 15:14:55.894878 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-17T15:14:55.894936792Z I0217 15:14:55.894893 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:14:55.894936792Z I0217 15:14:55.894895 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-17T15:14:55.894936792Z I0217 15:14:55.894913 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:14:55.895364033Z I0217 15:14:55.895295 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:08 +0000 UTC to 2028-02-17 15:03:09 +0000 UTC (now=2026-02-17 15:14:55.89523973 +0000 UTC))" 2026-02-17T15:14:55.895364033Z I0217 15:14:55.895340 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" 2026-02-17T15:14:55.895789123Z I0217 15:14:55.895715 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771341295\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771341295\" (2026-02-17 14:14:55 +0000 UTC to 2029-02-17 14:14:55 +0000 UTC (now=2026-02-17 15:14:55.895695111 +0000 UTC))" 2026-02-17T15:14:55.895816274Z I0217 15:14:55.895796 1 secure_serving.go:213] Serving securely on [::]:10259 2026-02-17T15:14:55.895977008Z I0217 15:14:55.895908 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-17T15:14:55.897121757Z I0217 15:14:55.897060 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-02-17T15:14:55.897480585Z I0217 15:14:55.897394 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.900630615Z I0217 15:14:55.900564 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.901629010Z I0217 15:14:55.901565 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-02-17T15:14:55.901759403Z I0217 15:14:55.900952 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.901759403Z I0217 15:14:55.901027 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-02-17T15:14:55.901785973Z I0217 15:14:55.901755 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-02-17T15:14:55.901785973Z I0217 15:14:55.901071 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.901861446Z I0217 15:14:55.901098 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.901888537Z I0217 15:14:55.901243 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.901946878Z I0217 15:14:55.901342 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.901967539Z I0217 15:14:55.901401 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.901986269Z I0217 15:14:55.901425 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.902075431Z I0217 15:14:55.901509 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.902075431Z I0217 15:14:55.901511 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.915849146Z I0217 15:14:55.915763 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.916102353Z I0217 15:14:55.916042 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.926256768Z I0217 15:14:55.926157 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.929527219Z I0217 15:14:55.929414 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-02-17T15:14:55.996116990Z I0217 15:14:55.995985 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-17T15:14:55.996344875Z I0217 15:14:55.996267 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler/kube-scheduler... 2026-02-17T15:14:55.996589291Z I0217 15:14:55.996449 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-17 14:51:46 +0000 UTC to 2026-02-18 14:51:46 +0000 UTC (now=2026-02-17 15:14:55.996412917 +0000 UTC))" 2026-02-17T15:14:55.996589291Z I0217 15:14:55.996557 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-17T15:14:55.996703644Z I0217 15:14:55.996627 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-17T15:14:55.996862728Z I0217 15:14:55.996808 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:08 +0000 UTC to 2028-02-17 15:03:09 +0000 UTC (now=2026-02-17 15:14:55.996791306 +0000 UTC))" 2026-02-17T15:14:55.997090625Z I0217 15:14:55.997037 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771341295\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771341295\" (2026-02-17 14:14:55 +0000 UTC to 2029-02-17 14:14:55 +0000 UTC (now=2026-02-17 15:14:55.997022142 +0000 UTC))" 2026-02-17T15:14:55.997292650Z I0217 15:14:55.997255 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:44:42 +0000 UTC to 2036-02-15 14:44:42 +0000 UTC (now=2026-02-17 15:14:55.997230778 +0000 UTC))" 2026-02-17T15:14:55.997335601Z I0217 15:14:55.997291 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2026-02-18 14:51:47 +0000 UTC (now=2026-02-17 15:14:55.997283029 +0000 UTC))" 2026-02-17T15:14:55.997351551Z I0217 15:14:55.997326 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:14:55.99731825 +0000 UTC))" 2026-02-17T15:14:55.997384832Z I0217 15:14:55.997348 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-17 14:51:47 +0000 UTC to 2027-02-17 14:51:47 +0000 UTC (now=2026-02-17 15:14:55.997341211 +0000 UTC))" 2026-02-17T15:14:55.997384832Z I0217 15:14:55.997368 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-17 14:51:45 +0000 UTC to 2036-02-15 14:51:45 +0000 UTC (now=2026-02-17 15:14:55.997361551 +0000 UTC))" 2026-02-17T15:14:55.997433793Z I0217 15:14:55.997391 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-17 14:51:46 +0000 UTC to 2026-02-18 14:51:46 +0000 UTC (now=2026-02-17 15:14:55.997385972 +0000 UTC))" 2026-02-17T15:14:55.997666879Z I0217 15:14:55.997614 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771340579\" (2026-02-17 15:03:08 +0000 UTC to 2028-02-17 15:03:09 +0000 UTC (now=2026-02-17 15:14:55.997600807 +0000 UTC))" 2026-02-17T15:14:55.997875074Z I0217 15:14:55.997835 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771341295\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771341295\" (2026-02-17 14:14:55 +0000 UTC to 2029-02-17 14:14:55 +0000 UTC (now=2026-02-17 15:14:55.997820582 +0000 UTC))" 2026-02-17T15:14:56.012517402Z I0217 15:14:56.012423 1 leaderelection.go:268] successfully acquired lease openshift-kube-scheduler/kube-scheduler 2026-02-17T15:15:00.147316839Z I0217 15:15:00.147165 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/collect-profiles-29522355-rfrsq" node="master-0" evaluatedNodes=1 feasibleNodes=1 wait-for-host-port_current.log0000640000000000000000000000010615145103004033320 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-02-17T15:14:55.112755954Z Waiting for port :10259 to be released.config/pod/openshift-kube-scheduler/logs/installer-5-master-0/installer_current.log0000640000000000000000000006657015145103004027170 0ustar00000000000000002026-02-17T15:14:03.996215715Z I0217 15:14:03.995823 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc00033b2c0 cert-secrets:0xc000697e00 configmaps:0xc0006979a0 namespace:0xc0006977c0 optional-configmaps:0xc000697ae0 optional-secrets:0xc000697a40 pod:0xc000697860 pod-manifest-dir:0xc000697c20 resource-dir:0xc000697b80 revision:0xc000697720 secrets:0xc000697900 v:0xc0000f5040] [0xc0000f5040 0xc000697720 0xc0006977c0 0xc000697860 0xc000697b80 0xc000697c20 0xc0006979a0 0xc000697ae0 0xc000697a40 0xc000697900 0xc00033b2c0 0xc000697e00] [] map[cert-configmaps:0xc000697ea0 cert-dir:0xc00033b2c0 cert-secrets:0xc000697e00 configmaps:0xc0006979a0 help:0xc0000f5900 kubeconfig:0xc000697680 log-flush-frequency:0xc0000f4dc0 namespace:0xc0006977c0 optional-cert-configmaps:0xc00033aa00 optional-cert-secrets:0xc00033a460 optional-configmaps:0xc000697ae0 optional-secrets:0xc000697a40 pod:0xc000697860 pod-manifest-dir:0xc000697c20 pod-manifests-lock-file:0xc000697d60 resource-dir:0xc000697b80 revision:0xc000697720 secrets:0xc000697900 timeout-duration:0xc000697cc0 v:0xc0000f5040 vmodule:0xc0000f5180] [0xc000697680 0xc000697720 0xc0006977c0 0xc000697860 0xc000697900 0xc0006979a0 0xc000697a40 0xc000697ae0 0xc000697b80 0xc000697c20 0xc000697cc0 0xc000697d60 0xc000697e00 0xc000697ea0 0xc00033a460 0xc00033aa00 0xc00033b2c0 0xc0000f4dc0 0xc0000f5040 0xc0000f5180 0xc0000f5900] [0xc000697ea0 0xc00033b2c0 0xc000697e00 0xc0006979a0 0xc0000f5900 0xc000697680 0xc0000f4dc0 0xc0006977c0 0xc00033aa00 0xc00033a460 0xc000697ae0 0xc000697a40 0xc000697860 0xc000697c20 0xc000697d60 0xc000697b80 0xc000697720 0xc000697900 0xc000697cc0 0xc0000f5040 0xc0000f5180] map[104:0xc0000f5900 118:0xc0000f5040] [] -1 0 0xc000436780 true 0x223d5a0 []} 2026-02-17T15:14:03.996396220Z I0217 15:14:03.996236 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000ab49c0)({ 2026-02-17T15:14:03.996396220Z KubeConfig: (string) "", 2026-02-17T15:14:03.996396220Z KubeClient: (kubernetes.Interface) , 2026-02-17T15:14:03.996396220Z Revision: (string) (len=1) "5", 2026-02-17T15:14:03.996396220Z NodeName: (string) "", 2026-02-17T15:14:03.996396220Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-17T15:14:03.996396220Z Clock: (clock.RealClock) { 2026-02-17T15:14:03.996396220Z }, 2026-02-17T15:14:03.996396220Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-17T15:14:03.996396220Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:14:03.996396220Z (string) (len=31) "localhost-recovery-client-token" 2026-02-17T15:14:03.996396220Z }, 2026-02-17T15:14:03.996396220Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:14:03.996396220Z (string) (len=12) "serving-cert" 2026-02-17T15:14:03.996396220Z }, 2026-02-17T15:14:03.996396220Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-17T15:14:03.996396220Z (string) (len=18) "kube-scheduler-pod", 2026-02-17T15:14:03.996396220Z (string) (len=6) "config", 2026-02-17T15:14:03.996396220Z (string) (len=17) "serviceaccount-ca", 2026-02-17T15:14:03.996396220Z (string) (len=20) "scheduler-kubeconfig", 2026-02-17T15:14:03.996396220Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-17T15:14:03.996396220Z }, 2026-02-17T15:14:03.996396220Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:14:03.996396220Z (string) (len=16) "policy-configmap" 2026-02-17T15:14:03.996396220Z }, 2026-02-17T15:14:03.996396220Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-17T15:14:03.996396220Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-17T15:14:03.996396220Z }, 2026-02-17T15:14:03.996396220Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-17T15:14:03.996396220Z CertConfigMapNamePrefixes: ([]string) , 2026-02-17T15:14:03.996396220Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-17T15:14:03.996396220Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-17T15:14:03.996396220Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-17T15:14:03.996396220Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-17T15:14:03.996396220Z Timeout: (time.Duration) 2m0s, 2026-02-17T15:14:03.996396220Z StaticPodManifestsLockFile: (string) "", 2026-02-17T15:14:03.996396220Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-17T15:14:03.996396220Z KubeletVersion: (string) "" 2026-02-17T15:14:03.996396220Z }) 2026-02-17T15:14:03.997613711Z I0217 15:14:03.997542 1 cmd.go:413] Getting controller reference for node master-0 2026-02-17T15:14:04.106532788Z I0217 15:14:04.105544 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-17T15:14:04.106532788Z I0217 15:14:04.105694 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:14:04.106532788Z I0217 15:14:04.105714 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:14:04.111525895Z I0217 15:14:04.111258 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-17T15:14:14.552881701Z I0217 15:14:14.552773 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-17T15:14:24.178165671Z I0217 15:14:24.178065 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-17T15:14:54.180352277Z I0217 15:14:54.180213 1 cmd.go:524] Getting installer pods for node master-0 2026-02-17T15:14:54.194543793Z I0217 15:14:54.194435 1 cmd.go:542] Latest installer revision for node master-0 is: 5 2026-02-17T15:14:54.194704317Z I0217 15:14:54.194646 1 cmd.go:431] Querying kubelet version for node master-0 2026-02-17T15:14:54.198678637Z I0217 15:14:54.198557 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-02-17T15:14:54.198678637Z I0217 15:14:54.198619 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5" ... 2026-02-17T15:14:54.198878682Z I0217 15:14:54.198827 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5" ... 2026-02-17T15:14:54.198878682Z I0217 15:14:54.198858 1 cmd.go:229] Getting secrets ... 2026-02-17T15:14:54.201838226Z I0217 15:14:54.201793 1 copy.go:32] Got secret openshift-kube-scheduler/localhost-recovery-client-token-5 2026-02-17T15:14:54.205547259Z I0217 15:14:54.204795 1 copy.go:32] Got secret openshift-kube-scheduler/serving-cert-5 2026-02-17T15:14:54.205547259Z I0217 15:14:54.204865 1 cmd.go:242] Getting config maps ... 2026-02-17T15:14:54.208150585Z I0217 15:14:54.208064 1 copy.go:60] Got configMap openshift-kube-scheduler/config-5 2026-02-17T15:14:54.211219021Z I0217 15:14:54.211132 1 copy.go:60] Got configMap openshift-kube-scheduler/kube-scheduler-cert-syncer-kubeconfig-5 2026-02-17T15:14:54.214144545Z I0217 15:14:54.214058 1 copy.go:60] Got configMap openshift-kube-scheduler/kube-scheduler-pod-5 2026-02-17T15:14:54.217282713Z I0217 15:14:54.217199 1 copy.go:60] Got configMap openshift-kube-scheduler/scheduler-kubeconfig-5 2026-02-17T15:14:54.220843873Z I0217 15:14:54.220680 1 copy.go:60] Got configMap openshift-kube-scheduler/serviceaccount-ca-5 2026-02-17T15:14:54.223601262Z I0217 15:14:54.223506 1 copy.go:52] Failed to get config map openshift-kube-scheduler/policy-configmap-5: configmaps "policy-configmap-5" not found 2026-02-17T15:14:54.223601262Z I0217 15:14:54.223544 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/secrets/localhost-recovery-client-token" ... 2026-02-17T15:14:54.287988027Z I0217 15:14:54.287894 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/secrets/localhost-recovery-client-token/token" ... 2026-02-17T15:14:54.288380907Z I0217 15:14:54.288337 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/secrets/localhost-recovery-client-token/ca.crt" ... 2026-02-17T15:14:54.288699494Z I0217 15:14:54.288633 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/secrets/localhost-recovery-client-token/namespace" ... 2026-02-17T15:14:54.288983992Z I0217 15:14:54.288915 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/secrets/localhost-recovery-client-token/service-ca.crt" ... 2026-02-17T15:14:54.289279300Z I0217 15:14:54.289198 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/secrets/serving-cert" ... 2026-02-17T15:14:54.289427653Z I0217 15:14:54.289383 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/secrets/serving-cert/tls.crt" ... 2026-02-17T15:14:54.289737661Z I0217 15:14:54.289692 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/secrets/serving-cert/tls.key" ... 2026-02-17T15:14:54.290009037Z I0217 15:14:54.289968 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/config" ... 2026-02-17T15:14:54.290306596Z I0217 15:14:54.290206 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/config/config.yaml" ... 2026-02-17T15:14:54.290595153Z I0217 15:14:54.290534 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/kube-scheduler-cert-syncer-kubeconfig" ... 2026-02-17T15:14:54.290761277Z I0217 15:14:54.290705 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig" ... 2026-02-17T15:14:54.291027693Z I0217 15:14:54.290986 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/kube-scheduler-pod" ... 2026-02-17T15:14:54.291196487Z I0217 15:14:54.291152 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/kube-scheduler-pod/pod.yaml" ... 2026-02-17T15:14:54.291484084Z I0217 15:14:54.291433 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/kube-scheduler-pod/version" ... 2026-02-17T15:14:54.291751592Z I0217 15:14:54.291707 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/kube-scheduler-pod/forceRedeploymentReason" ... 2026-02-17T15:14:54.292027729Z I0217 15:14:54.291980 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/scheduler-kubeconfig" ... 2026-02-17T15:14:54.292155502Z I0217 15:14:54.292113 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/scheduler-kubeconfig/kubeconfig" ... 2026-02-17T15:14:54.292419218Z I0217 15:14:54.292362 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/serviceaccount-ca" ... 2026-02-17T15:14:54.292530311Z I0217 15:14:54.292487 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-02-17T15:14:54.292747996Z I0217 15:14:54.292704 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-certs" ... 2026-02-17T15:14:54.292893790Z I0217 15:14:54.292855 1 cmd.go:229] Getting secrets ... 2026-02-17T15:14:54.384960819Z I0217 15:14:54.384899 1 copy.go:32] Got secret openshift-kube-scheduler/kube-scheduler-client-cert-key 2026-02-17T15:14:54.385018440Z I0217 15:14:54.385005 1 cmd.go:242] Getting config maps ... 2026-02-17T15:14:54.385034261Z I0217 15:14:54.385022 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key" ... 2026-02-17T15:14:54.385420590Z I0217 15:14:54.385375 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key/tls.key" ... 2026-02-17T15:14:54.385824151Z I0217 15:14:54.385752 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key/tls.crt" ... 2026-02-17T15:14:54.386224561Z I0217 15:14:54.386168 1 cmd.go:335] Getting pod configmaps/kube-scheduler-pod-5 -n openshift-kube-scheduler 2026-02-17T15:14:54.584077143Z I0217 15:14:54.583937 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-02-17T15:14:54.584077143Z I0217 15:14:54.584029 1 cmd.go:379] Writing a pod under "kube-scheduler-pod.yaml" key 2026-02-17T15:14:54.584077143Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"openshift-kube-scheduler","namespace":"openshift-kube-scheduler","creationTimestamp":null,"labels":{"app":"openshift-kube-scheduler","revision":"5","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs"}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"containerPort":10259}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-17T15:14:54.595163151Z I0217 15:14:54.595110 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5/kube-scheduler-pod.yaml" ... 2026-02-17T15:14:54.595543781Z I0217 15:14:54.595483 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-scheduler-pod.yaml" ... 2026-02-17T15:14:54.595543781Z I0217 15:14:54.595506 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-scheduler-pod.yaml" ... 2026-02-17T15:14:54.595543781Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"openshift-kube-scheduler","namespace":"openshift-kube-scheduler","creationTimestamp":null,"labels":{"app":"openshift-kube-scheduler","revision":"5","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-5"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs"}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"containerPort":10259}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001320115145103004027145 0ustar00000000000000002026-02-17T15:03:39.801282293Z I0217 15:03:39.800519 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000b4d7c0 cert-secrets:0xc000b4d540 configmaps:0xc000b4d0e0 namespace:0xc000b4cf00 optional-configmaps:0xc000b4d220 optional-secrets:0xc000b4d180 pod:0xc000b4cfa0 pod-manifest-dir:0xc000b4d360 resource-dir:0xc000b4d2c0 revision:0xc000b4ce60 secrets:0xc000b4d040 v:0xc000b5c280] [0xc000b5c280 0xc000b4ce60 0xc000b4cf00 0xc000b4cfa0 0xc000b4d2c0 0xc000b4d360 0xc000b4d0e0 0xc000b4d220 0xc000b4d180 0xc000b4d040 0xc000b4d7c0 0xc000b4d540] [] map[cert-configmaps:0xc000b4d5e0 cert-dir:0xc000b4d7c0 cert-secrets:0xc000b4d540 configmaps:0xc000b4d0e0 help:0xc000b5c640 kubeconfig:0xc000b4cdc0 log-flush-frequency:0xc000b5c1e0 namespace:0xc000b4cf00 optional-cert-configmaps:0xc000b4d720 optional-cert-secrets:0xc000b4d680 optional-configmaps:0xc000b4d220 optional-secrets:0xc000b4d180 pod:0xc000b4cfa0 pod-manifest-dir:0xc000b4d360 pod-manifests-lock-file:0xc000b4d4a0 resource-dir:0xc000b4d2c0 revision:0xc000b4ce60 secrets:0xc000b4d040 timeout-duration:0xc000b4d400 v:0xc000b5c280 vmodule:0xc000b5c320] [0xc000b4cdc0 0xc000b4ce60 0xc000b4cf00 0xc000b4cfa0 0xc000b4d040 0xc000b4d0e0 0xc000b4d180 0xc000b4d220 0xc000b4d2c0 0xc000b4d360 0xc000b4d400 0xc000b4d4a0 0xc000b4d540 0xc000b4d5e0 0xc000b4d680 0xc000b4d720 0xc000b4d7c0 0xc000b5c1e0 0xc000b5c280 0xc000b5c320 0xc000b5c640] [0xc000b4d5e0 0xc000b4d7c0 0xc000b4d540 0xc000b4d0e0 0xc000b5c640 0xc000b4cdc0 0xc000b5c1e0 0xc000b4cf00 0xc000b4d720 0xc000b4d680 0xc000b4d220 0xc000b4d180 0xc000b4cfa0 0xc000b4d360 0xc000b4d4a0 0xc000b4d2c0 0xc000b4ce60 0xc000b4d040 0xc000b4d400 0xc000b5c280 0xc000b5c320] map[104:0xc000b5c640 118:0xc000b5c280] [] -1 0 0xc000b34d20 true 0x223d5a0 []} 2026-02-17T15:03:39.801282293Z I0217 15:03:39.800749 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0002ef040)({ 2026-02-17T15:03:39.801282293Z KubeConfig: (string) "", 2026-02-17T15:03:39.801282293Z KubeClient: (kubernetes.Interface) , 2026-02-17T15:03:39.801282293Z Revision: (string) (len=1) "3", 2026-02-17T15:03:39.801282293Z NodeName: (string) "", 2026-02-17T15:03:39.801282293Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-17T15:03:39.801282293Z Clock: (clock.RealClock) { 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-17T15:03:39.801282293Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:03:39.801282293Z (string) (len=31) "localhost-recovery-client-token" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:03:39.801282293Z (string) (len=12) "serving-cert" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-17T15:03:39.801282293Z (string) (len=18) "kube-scheduler-pod", 2026-02-17T15:03:39.801282293Z (string) (len=6) "config", 2026-02-17T15:03:39.801282293Z (string) (len=17) "serviceaccount-ca", 2026-02-17T15:03:39.801282293Z (string) (len=20) "scheduler-kubeconfig", 2026-02-17T15:03:39.801282293Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:03:39.801282293Z (string) (len=16) "policy-configmap" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-17T15:03:39.801282293Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-17T15:03:39.801282293Z }, 2026-02-17T15:03:39.801282293Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-17T15:03:39.801282293Z CertConfigMapNamePrefixes: ([]string) , 2026-02-17T15:03:39.801282293Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-17T15:03:39.801282293Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-17T15:03:39.801282293Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-17T15:03:39.801282293Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-17T15:03:39.801282293Z Timeout: (time.Duration) 2m0s, 2026-02-17T15:03:39.801282293Z StaticPodManifestsLockFile: (string) "", 2026-02-17T15:03:39.801282293Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-17T15:03:39.801282293Z KubeletVersion: (string) "" 2026-02-17T15:03:39.801282293Z }) 2026-02-17T15:03:39.894683223Z I0217 15:03:39.894623 1 cmd.go:413] Getting controller reference for node master-0 2026-02-17T15:03:39.902053999Z I0217 15:03:39.902009 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-17T15:03:39.902077250Z I0217 15:03:39.902058 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:03:39.902077250Z I0217 15:03:39.902067 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:03:39.904108469Z I0217 15:03:39.904086 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-17T15:03:49.909322369Z I0217 15:03:49.909269 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-17T15:04:19.909673217Z I0217 15:04:19.909590 1 cmd.go:524] Getting installer pods for node master-0 2026-02-17T15:04:33.914120177Z F0217 15:04:33.914032 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001642415145103004022644 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"03da22e3-956d-4c8a-bfd6-c1778e5d627c","resourceVersion":"8474","creationTimestamp":"2026-02-17T15:03:38Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.47/23\"],\"mac_address\":\"0a:58:0a:80:00:2f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.47/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.47\"\n ],\n \"mac\": \"0a:58:0a:80:00:2f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"f9ac3021-63d0-4382-aaed-422018afae21"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:05:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:38Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:05:35Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:05:35Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:38Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.47","podIPs":[{"ip":"10.128.0.47"}],"startTime":"2026-02-17T15:03:38Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"[]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0217 15:03:39.894623 1 cmd.go:413] Getting controller reference for node master-0\nI0217 15:03:39.902009 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0217 15:03:39.902058 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:03:39.902067 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:03:39.904086 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0217 15:03:49.909269 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0217 15:04:19.909590 1 cmd.go:524] Getting installer pods for node master-0\nF0217 15:04:33.914032 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-17T15:03:39Z","finishedAt":"2026-02-17T15:04:33Z","containerID":"cri-o://848358e86030aaad08f0f93cbd72a6dd3c9d1bf771c63059da694d462594c54f"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","containerID":"cri-o://848358e86030aaad08f0f93cbd72a6dd3c9d1bf771c63059da694d462594c54f","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-3-master-0/installer_current.log0000640000000000000000000002006115145103004027171 0ustar00000000000000002026-02-17T15:14:44.092319452Z I0217 15:14:44.091972 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0009dd680 cert-dir:0xc0009dd860 cert-secrets:0xc0009dd5e0 configmaps:0xc0009dd180 namespace:0xc0009dcfa0 optional-cert-configmaps:0xc0009dd7c0 optional-cert-secrets:0xc0009dd720 optional-configmaps:0xc0009dd2c0 optional-secrets:0xc0009dd220 pod:0xc0009dd040 pod-manifest-dir:0xc0009dd400 resource-dir:0xc0009dd360 revision:0xc0009dcf00 secrets:0xc0009dd0e0 v:0xc0003a19a0] [0xc0003a19a0 0xc0009dcf00 0xc0009dcfa0 0xc0009dd040 0xc0009dd360 0xc0009dd400 0xc0009dd180 0xc0009dd2c0 0xc0009dd0e0 0xc0009dd220 0xc0009dd860 0xc0009dd680 0xc0009dd7c0 0xc0009dd5e0 0xc0009dd720] [] map[cert-configmaps:0xc0009dd680 cert-dir:0xc0009dd860 cert-secrets:0xc0009dd5e0 configmaps:0xc0009dd180 help:0xc00091c5a0 kubeconfig:0xc0009dce60 log-flush-frequency:0xc00033dea0 namespace:0xc0009dcfa0 optional-cert-configmaps:0xc0009dd7c0 optional-cert-secrets:0xc0009dd720 optional-configmaps:0xc0009dd2c0 optional-secrets:0xc0009dd220 pod:0xc0009dd040 pod-manifest-dir:0xc0009dd400 pod-manifests-lock-file:0xc0009dd540 resource-dir:0xc0009dd360 revision:0xc0009dcf00 secrets:0xc0009dd0e0 timeout-duration:0xc0009dd4a0 v:0xc0003a19a0 vmodule:0xc0003a1ae0] [0xc0009dce60 0xc0009dcf00 0xc0009dcfa0 0xc0009dd040 0xc0009dd0e0 0xc0009dd180 0xc0009dd220 0xc0009dd2c0 0xc0009dd360 0xc0009dd400 0xc0009dd4a0 0xc0009dd540 0xc0009dd5e0 0xc0009dd680 0xc0009dd720 0xc0009dd7c0 0xc0009dd860 0xc00033dea0 0xc0003a19a0 0xc0003a1ae0 0xc00091c5a0] [0xc0009dd680 0xc0009dd860 0xc0009dd5e0 0xc0009dd180 0xc00091c5a0 0xc0009dce60 0xc00033dea0 0xc0009dcfa0 0xc0009dd7c0 0xc0009dd720 0xc0009dd2c0 0xc0009dd220 0xc0009dd040 0xc0009dd400 0xc0009dd540 0xc0009dd360 0xc0009dcf00 0xc0009dd0e0 0xc0009dd4a0 0xc0003a19a0 0xc0003a1ae0] map[104:0xc00091c5a0 118:0xc0003a19a0] [] -1 0 0xc00056f2f0 true 0xae1c20 []} 2026-02-17T15:14:44.092558408Z I0217 15:14:44.092315 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00064e4e0)({ 2026-02-17T15:14:44.092558408Z KubeConfig: (string) "", 2026-02-17T15:14:44.092558408Z KubeClient: (kubernetes.Interface) , 2026-02-17T15:14:44.092558408Z Revision: (string) (len=1) "3", 2026-02-17T15:14:44.092558408Z NodeName: (string) "", 2026-02-17T15:14:44.092558408Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-17T15:14:44.092558408Z Clock: (clock.RealClock) { 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-17T15:14:44.092558408Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-17T15:14:44.092558408Z (string) (len=11) "etcd-client", 2026-02-17T15:14:44.092558408Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-17T15:14:44.092558408Z (string) (len=31) "localhost-recovery-client-token" 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-17T15:14:44.092558408Z (string) (len=17) "encryption-config", 2026-02-17T15:14:44.092558408Z (string) (len=21) "webhook-authenticator" 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-17T15:14:44.092558408Z (string) (len=18) "kube-apiserver-pod", 2026-02-17T15:14:44.092558408Z (string) (len=6) "config", 2026-02-17T15:14:44.092558408Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-17T15:14:44.092558408Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-17T15:14:44.092558408Z (string) (len=15) "etcd-serving-ca", 2026-02-17T15:14:44.092558408Z (string) (len=18) "kubelet-serving-ca", 2026-02-17T15:14:44.092558408Z (string) (len=22) "sa-token-signing-certs", 2026-02-17T15:14:44.092558408Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-17T15:14:44.092558408Z (string) (len=14) "oauth-metadata", 2026-02-17T15:14:44.092558408Z (string) (len=12) "cloud-config", 2026-02-17T15:14:44.092558408Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-17T15:14:44.092558408Z (string) (len=17) "aggregator-client", 2026-02-17T15:14:44.092558408Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-17T15:14:44.092558408Z (string) (len=31) "service-network-serving-certkey", 2026-02-17T15:14:44.092558408Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-17T15:14:44.092558408Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-17T15:14:44.092558408Z (string) (len=33) "bound-service-account-signing-key", 2026-02-17T15:14:44.092558408Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-17T15:14:44.092558408Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-17T15:14:44.092558408Z (string) (len=14) "kubelet-client", 2026-02-17T15:14:44.092558408Z (string) (len=16) "node-kubeconfigs" 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-17T15:14:44.092558408Z (string) (len=17) "user-serving-cert", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-000", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-001", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-002", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-003", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-004", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-005", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-006", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-007", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-008", 2026-02-17T15:14:44.092558408Z (string) (len=21) "user-serving-cert-009" 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-17T15:14:44.092558408Z (string) (len=20) "aggregator-client-ca", 2026-02-17T15:14:44.092558408Z (string) (len=9) "client-ca", 2026-02-17T15:14:44.092558408Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-17T15:14:44.092558408Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:14:44.092558408Z (string) (len=17) "trusted-ca-bundle" 2026-02-17T15:14:44.092558408Z }, 2026-02-17T15:14:44.092558408Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-17T15:14:44.092558408Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-17T15:14:44.092558408Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-17T15:14:44.092558408Z Timeout: (time.Duration) 2m0s, 2026-02-17T15:14:44.092558408Z StaticPodManifestsLockFile: (string) "", 2026-02-17T15:14:44.092558408Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-17T15:14:44.092558408Z KubeletVersion: (string) "" 2026-02-17T15:14:44.092558408Z }) 2026-02-17T15:14:44.095688066Z I0217 15:14:44.095615 1 cmd.go:413] Getting controller reference for node master-0 2026-02-17T15:14:44.188320371Z I0217 15:14:44.188234 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-17T15:14:44.188365532Z I0217 15:14:44.188321 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:14:44.188365532Z I0217 15:14:44.188334 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:14:44.192952236Z I0217 15:14:44.192875 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-17T15:14:54.199260651Z I0217 15:14:54.199181 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715145103004027174 0ustar00000000000000002026-02-17T15:03:37.900516254Z I0217 15:03:37.894367 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000b7da40 cert-dir:0xc000b7dc20 cert-secrets:0xc000b7d9a0 configmaps:0xc000b7d540 namespace:0xc000b7d360 optional-cert-configmaps:0xc000b7db80 optional-cert-secrets:0xc000b7dae0 optional-configmaps:0xc000b7d680 optional-secrets:0xc000b7d5e0 pod:0xc000b7d400 pod-manifest-dir:0xc000b7d7c0 resource-dir:0xc000b7d720 revision:0xc000b7d2c0 secrets:0xc000b7d4a0 v:0xc00057f2c0] [0xc00057f2c0 0xc000b7d2c0 0xc000b7d360 0xc000b7d400 0xc000b7d720 0xc000b7d7c0 0xc000b7d540 0xc000b7d680 0xc000b7d4a0 0xc000b7d5e0 0xc000b7dc20 0xc000b7da40 0xc000b7db80 0xc000b7d9a0 0xc000b7dae0] [] map[cert-configmaps:0xc000b7da40 cert-dir:0xc000b7dc20 cert-secrets:0xc000b7d9a0 configmaps:0xc000b7d540 help:0xc00057f680 kubeconfig:0xc000b7d220 log-flush-frequency:0xc00057f220 namespace:0xc000b7d360 optional-cert-configmaps:0xc000b7db80 optional-cert-secrets:0xc000b7dae0 optional-configmaps:0xc000b7d680 optional-secrets:0xc000b7d5e0 pod:0xc000b7d400 pod-manifest-dir:0xc000b7d7c0 pod-manifests-lock-file:0xc000b7d900 resource-dir:0xc000b7d720 revision:0xc000b7d2c0 secrets:0xc000b7d4a0 timeout-duration:0xc000b7d860 v:0xc00057f2c0 vmodule:0xc00057f360] [0xc000b7d220 0xc000b7d2c0 0xc000b7d360 0xc000b7d400 0xc000b7d4a0 0xc000b7d540 0xc000b7d5e0 0xc000b7d680 0xc000b7d720 0xc000b7d7c0 0xc000b7d860 0xc000b7d900 0xc000b7d9a0 0xc000b7da40 0xc000b7dae0 0xc000b7db80 0xc000b7dc20 0xc00057f220 0xc00057f2c0 0xc00057f360 0xc00057f680] [0xc000b7da40 0xc000b7dc20 0xc000b7d9a0 0xc000b7d540 0xc00057f680 0xc000b7d220 0xc00057f220 0xc000b7d360 0xc000b7db80 0xc000b7dae0 0xc000b7d680 0xc000b7d5e0 0xc000b7d400 0xc000b7d7c0 0xc000b7d900 0xc000b7d720 0xc000b7d2c0 0xc000b7d4a0 0xc000b7d860 0xc00057f2c0 0xc00057f360] map[104:0xc00057f680 118:0xc00057f2c0] [] -1 0 0xc00021c870 true 0xae1c20 []} 2026-02-17T15:03:37.900516254Z I0217 15:03:37.895197 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0005389c0)({ 2026-02-17T15:03:37.900516254Z KubeConfig: (string) "", 2026-02-17T15:03:37.900516254Z KubeClient: (kubernetes.Interface) , 2026-02-17T15:03:37.900516254Z Revision: (string) (len=1) "1", 2026-02-17T15:03:37.900516254Z NodeName: (string) "", 2026-02-17T15:03:37.900516254Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-17T15:03:37.900516254Z Clock: (clock.RealClock) { 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-17T15:03:37.900516254Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-17T15:03:37.900516254Z (string) (len=11) "etcd-client", 2026-02-17T15:03:37.900516254Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=31) "localhost-recovery-client-token" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-17T15:03:37.900516254Z (string) (len=17) "encryption-config", 2026-02-17T15:03:37.900516254Z (string) (len=21) "webhook-authenticator" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-17T15:03:37.900516254Z (string) (len=18) "kube-apiserver-pod", 2026-02-17T15:03:37.900516254Z (string) (len=6) "config", 2026-02-17T15:03:37.900516254Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-17T15:03:37.900516254Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-17T15:03:37.900516254Z (string) (len=15) "etcd-serving-ca", 2026-02-17T15:03:37.900516254Z (string) (len=18) "kubelet-serving-ca", 2026-02-17T15:03:37.900516254Z (string) (len=22) "sa-token-signing-certs", 2026-02-17T15:03:37.900516254Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-17T15:03:37.900516254Z (string) (len=14) "oauth-metadata", 2026-02-17T15:03:37.900516254Z (string) (len=12) "cloud-config", 2026-02-17T15:03:37.900516254Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-17T15:03:37.900516254Z (string) (len=17) "aggregator-client", 2026-02-17T15:03:37.900516254Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=31) "service-network-serving-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-17T15:03:37.900516254Z (string) (len=33) "bound-service-account-signing-key", 2026-02-17T15:03:37.900516254Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-17T15:03:37.900516254Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-17T15:03:37.900516254Z (string) (len=14) "kubelet-client", 2026-02-17T15:03:37.900516254Z (string) (len=16) "node-kubeconfigs" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-17T15:03:37.900516254Z (string) (len=17) "user-serving-cert", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-000", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-001", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-002", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-003", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-004", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-005", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-006", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-007", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-008", 2026-02-17T15:03:37.900516254Z (string) (len=21) "user-serving-cert-009" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-17T15:03:37.900516254Z (string) (len=20) "aggregator-client-ca", 2026-02-17T15:03:37.900516254Z (string) (len=9) "client-ca", 2026-02-17T15:03:37.900516254Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-17T15:03:37.900516254Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-17T15:03:37.900516254Z (string) (len=17) "trusted-ca-bundle" 2026-02-17T15:03:37.900516254Z }, 2026-02-17T15:03:37.900516254Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-17T15:03:37.900516254Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-17T15:03:37.900516254Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-17T15:03:37.900516254Z Timeout: (time.Duration) 2m0s, 2026-02-17T15:03:37.900516254Z StaticPodManifestsLockFile: (string) "", 2026-02-17T15:03:37.900516254Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-17T15:03:37.900516254Z KubeletVersion: (string) "" 2026-02-17T15:03:37.900516254Z }) 2026-02-17T15:03:37.905240787Z I0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0 2026-02-17T15:03:37.916575058Z I0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-17T15:03:37.916575058Z I0217 15:03:37.913332 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-17T15:03:37.916575058Z I0217 15:03:37.913342 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-17T15:03:37.925511143Z I0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-17T15:04:07.924825275Z I0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0 2026-02-17T15:04:21.928602000Z F0217 15:04:21.928422 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115145103004022654 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"580b240a-a806-454d-ab19-8f193a8d9ca2","resourceVersion":"8459","creationTimestamp":"2026-02-17T15:03:35Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"9dc33f9e-930a-4edc-80fd-16c00958a166"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:25Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:35Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:24Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:24Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-02-17T15:03:35Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0\nI0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0217 15:03:37.913332 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:03:37.913342 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0\nF0217 15:04:21.928422 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-17T15:03:37Z","finishedAt":"2026-02-17T15:04:23Z","containerID":"cri-o://dcdeeb6985f895a6d59b345be94e95ea3c9c558f1f7b7901594a31fa91429102"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://dcdeeb6985f895a6d59b345be94e95ea3c9c558f1f7b7901594a31fa91429102","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615145103004035754 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-17T15:00:24.481812719Z I0217 15:00:24.481525 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010711615145103004032652 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-17T15:15:04.444932292Z I0217 15:15:04.444881 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:04.601580102Z I0217 15:15:04.601498 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:04.643335199Z I0217 15:15:04.643245 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:04.645515713Z I0217 15:15:04.645423 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:04.802152632Z I0217 15:15:04.802052 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:04.844654639Z I0217 15:15:04.844520 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:04.845511910Z I0217 15:15:04.845378 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.002586869Z I0217 15:15:05.002503 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.044389888Z I0217 15:15:05.044310 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.045300501Z I0217 15:15:05.045211 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.202436892Z I0217 15:15:05.202348 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.243347308Z I0217 15:15:05.243259 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.245323668Z I0217 15:15:05.245260 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.402033609Z I0217 15:15:05.401971 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.451357326Z I0217 15:15:05.451280 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.451568211Z I0217 15:15:05.451515 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.601869770Z I0217 15:15:05.601755 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.643280339Z I0217 15:15:05.643194 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.645390812Z I0217 15:15:05.645326 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.801514748Z I0217 15:15:05.801428 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.843072311Z I0217 15:15:05.842995 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:05.844940177Z I0217 15:15:05.844893 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.002062398Z I0217 15:15:06.001957 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.044240956Z I0217 15:15:06.044155 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.045379044Z I0217 15:15:06.045298 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.201520131Z I0217 15:15:06.201401 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.243926834Z I0217 15:15:06.243840 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.244978091Z I0217 15:15:06.244935 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.401632990Z I0217 15:15:06.401548 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.443276144Z I0217 15:15:06.443169 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.445534961Z I0217 15:15:06.445436 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.601419681Z I0217 15:15:06.601320 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.644030660Z I0217 15:15:06.643937 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.645589589Z I0217 15:15:06.645436 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.802224488Z I0217 15:15:06.802122 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.843986825Z I0217 15:15:06.843873 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:06.845277707Z I0217 15:15:06.845218 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.002078230Z I0217 15:15:07.001995 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.046528665Z I0217 15:15:07.043960 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.046528665Z I0217 15:15:07.045204 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.203113622Z I0217 15:15:07.202713 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.243808813Z I0217 15:15:07.243743 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.246017829Z I0217 15:15:07.245962 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.401770025Z I0217 15:15:07.401695 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.443714567Z I0217 15:15:07.443593 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.445910162Z I0217 15:15:07.445795 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.601900585Z I0217 15:15:07.601762 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.644215776Z I0217 15:15:07.644103 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.645222161Z I0217 15:15:07.645148 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.802250520Z I0217 15:15:07.802159 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.843803382Z I0217 15:15:07.843737 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:07.847491634Z I0217 15:15:07.846021 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.001826375Z I0217 15:15:08.001764 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.043624933Z I0217 15:15:08.043502 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.045919191Z I0217 15:15:08.045840 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.201735979Z I0217 15:15:08.201621 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.243531057Z I0217 15:15:08.243421 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.246680216Z I0217 15:15:08.246591 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.401533571Z I0217 15:15:08.401391 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.444194260Z I0217 15:15:08.444069 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.445988336Z I0217 15:15:08.445915 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.602107691Z I0217 15:15:08.602016 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.644041243Z I0217 15:15:08.643943 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.645898269Z I0217 15:15:08.645817 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.694022997Z E0217 15:15:08.693894 1 remote_available_controller.go:470] "Unhandled Error" err="v1beta1.metrics.k8s.io failed with: failing or missing response from https://10.128.0.81:10250/apis/metrics.k8s.io/v1beta1: bad status from https://10.128.0.81:10250/apis/metrics.k8s.io/v1beta1: 401" logger="UnhandledError" 2026-02-17T15:15:08.801524574Z I0217 15:15:08.801386 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.849916967Z I0217 15:15:08.849820 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:08.850069741Z I0217 15:15:08.849996 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.002115445Z I0217 15:15:09.001982 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.043916573Z I0217 15:15:09.043821 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.044988190Z I0217 15:15:09.044860 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.201848924Z I0217 15:15:09.201746 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.244024502Z I0217 15:15:09.243972 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.245695034Z I0217 15:15:09.245622 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.402383694Z I0217 15:15:09.402291 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.443972666Z I0217 15:15:09.443858 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.445734211Z I0217 15:15:09.445662 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.584432220Z W0217 15:15:09.584346 1 reflector.go:561] github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/user/informers/externalversions/factory.go:125: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2026-02-17T15:15:09.584581524Z E0217 15:15:09.584420 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/user/informers/externalversions/factory.go:125: Failed to watch *v1.Group: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io)" logger="UnhandledError" 2026-02-17T15:15:09.602409861Z I0217 15:15:09.602325 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.644071815Z I0217 15:15:09.643996 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.645297376Z I0217 15:15:09.645252 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.802306124Z I0217 15:15:09.802215 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.844371699Z I0217 15:15:09.844292 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:09.844985775Z I0217 15:15:09.844903 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.002390862Z I0217 15:15:10.002302 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.043327320Z I0217 15:15:10.043235 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.045384381Z I0217 15:15:10.045316 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.201950028Z I0217 15:15:10.201889 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.243432288Z I0217 15:15:10.243369 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.245543121Z I0217 15:15:10.245499 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.402208761Z I0217 15:15:10.402080 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.443781244Z I0217 15:15:10.443685 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.445308352Z I0217 15:15:10.445236 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.603676784Z I0217 15:15:10.603567 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.644420786Z I0217 15:15:10.644324 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.645486453Z I0217 15:15:10.645412 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.802622814Z I0217 15:15:10.802522 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.843579571Z I0217 15:15:10.843451 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-17T15:15:10.845627263Z I0217 15:15:10.845522 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015145103004031134 0ustar00000000000000002026-02-17T15:00:20.187530847Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000007312615145103004036750 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-54984b6678-p5mdv2026-02-17T15:14:16.878975493Z I0217 15:14:16.878919 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/bound-sa-token-signing-certs-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:16.879659280Z I0217 15:14:16.879607 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:17.072404804Z I0217 15:14:17.072317 1 request.go:700] Waited for 1.649507562s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client 2026-02-17T15:14:18.271380006Z I0217 15:14:18.271298 1 request.go:700] Waited for 1.797526485s due to client-side throttling, not priority and fairness, request: DELETE:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/installer-1-retry-1-master-0 2026-02-17T15:14:18.281351696Z I0217 15:14:18.279772 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-17T15:14:18.281351696Z NodeName: (string) (len=8) "master-0", 2026-02-17T15:14:18.281351696Z CurrentRevision: (int32) 0, 2026-02-17T15:14:18.281351696Z TargetRevision: (int32) 2, 2026-02-17T15:14:18.281351696Z LastFailedRevision: (int32) 1, 2026-02-17T15:14:18.281351696Z LastFailedTime: (*v1.Time)(0xc005e7b188)(2026-02-17 15:13:53 +0000 UTC), 2026-02-17T15:14:18.281351696Z LastFailedReason: (string) (len=15) "InstallerFailed", 2026-02-17T15:14:18.281351696Z LastFailedCount: (int) 1, 2026-02-17T15:14:18.281351696Z LastFallbackCount: (int) 0, 2026-02-17T15:14:18.281351696Z LastFailedRevisionErrors: ([]string) (len=1 cap=1) { 2026-02-17T15:14:18.281351696Z (string) (len=2059) "installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) ,\n KubeletVersion: (string) \"\"\n})\nI0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0\nI0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0217 15:03:37.913332 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:03:37.913342 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0\nF0217 15:04:21.928422 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n" 2026-02-17T15:14:18.281351696Z } 2026-02-17T15:14:18.281351696Z } 2026-02-17T15:14:18.281351696Z because new revision pending 2026-02-17T15:14:18.288369272Z W0217 15:14:18.288304 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:14:18.288369272Z W0217 15:14:18.288328 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:14:18.288369272Z W0217 15:14:18.288333 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:14:18.288369272Z W0217 15:14:18.288337 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:14:18.288369272Z W0217 15:14:18.288341 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-17T15:14:18.320757395Z I0217 15:14:18.320679 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:18.320877628Z I0217 15:14:18.320838 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:02:39Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:33Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:02:40Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:39Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:39Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:14:18.324733814Z I0217 15:14:18.324691 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. 2026-02-17T15:14:18.334298844Z I0217 15:14:18.333638 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0217 15:03:37.913332 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0217 15:03:37.913342 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0217 15:04:21.928422 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " to "NodeControllerDegraded: All master nodes are ready",Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" 2026-02-17T15:14:18.681446822Z I0217 15:14:18.681374 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/etcd-serving-ca-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:18.681931734Z I0217 15:14:18.681886 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:19.271910652Z I0217 15:14:19.271791 1 request.go:700] Waited for 1.798299795s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/localhost-recovery-client-token 2026-02-17T15:14:20.471519472Z I0217 15:14:20.471452 1 request.go:700] Waited for 1.991953664s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-audit-policies 2026-02-17T15:14:20.682347839Z I0217 15:14:20.682067 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-apiserver-server-ca-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:20.685227082Z I0217 15:14:20.685173 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:21.471837542Z I0217 15:14:21.471734 1 request.go:700] Waited for 1.795531987s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/kube-apiserver-master-0 2026-02-17T15:14:22.080190941Z I0217 15:14:22.080095 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kubelet-serving-ca-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:22.080274433Z I0217 15:14:22.080233 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:22.671967713Z I0217 15:14:22.671823 1 request.go:700] Waited for 1.391798259s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-pod 2026-02-17T15:14:22.890578596Z I0217 15:14:22.890473 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-2-master-0 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:23.279847249Z I0217 15:14:23.279704 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/sa-token-signing-certs-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:23.280447245Z I0217 15:14:23.280359 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:23.672078248Z I0217 15:14:23.671921 1 request.go:700] Waited for 1.17614493s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs 2026-02-17T15:14:24.474000701Z I0217 15:14:24.473896 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-02-17T15:14:24.872164898Z I0217 15:14:24.872098 1 request.go:700] Waited for 1.792628953s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-audit-policies 2026-02-17T15:14:25.078704738Z I0217 15:14:25.078563 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-apiserver-audit-policies-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:25.079319934Z I0217 15:14:25.079238 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:26.071869730Z I0217 15:14:26.071744 1 request.go:700] Waited for 1.792404707s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller 2026-02-17T15:14:26.890429040Z I0217 15:14:26.890315 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/etcd-client-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:27.071992614Z I0217 15:14:27.071887 1 request.go:700] Waited for 1.766446526s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client 2026-02-17T15:14:28.072209011Z I0217 15:14:28.072096 1 request.go:700] Waited for 1.795226987s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/installer-2-master-0 2026-02-17T15:14:29.272436535Z I0217 15:14:29.272333 1 request.go:700] Waited for 1.780877348s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client 2026-02-17T15:14:29.476393761Z I0217 15:14:29.476289 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:29.881852561Z I0217 15:14:29.881732 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-serving-certkey-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:30.684080512Z I0217 15:14:30.682429 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-client-token-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:31.679509028Z I0217 15:14:31.679382 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/webhook-authenticator-3 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:32.482606411Z I0217 15:14:32.481612 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:32.678869203Z I0217 15:14:32.678734 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:32.678869203Z I0217 15:14:32.678785 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 3 triggered by "required configmap/config has changed" 2026-02-17T15:14:32.728662282Z I0217 15:14:32.728552 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:32.731082803Z I0217 15:14:32.730971 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. 2026-02-17T15:14:33.872219445Z I0217 15:14:33.871875 1 request.go:700] Waited for 1.143139862s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/kube-apiserver-master-0 2026-02-17T15:14:35.071362761Z I0217 15:14:35.071294 1 request.go:700] Waited for 1.391942622s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-audit-policies 2026-02-17T15:14:35.675612857Z I0217 15:14:35.675533 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:36.706687298Z I0217 15:14:36.706601 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. 2026-02-17T15:14:37.283186308Z I0217 15:14:37.283095 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-17T15:14:37.283186308Z NodeName: (string) (len=8) "master-0", 2026-02-17T15:14:37.283186308Z CurrentRevision: (int32) 0, 2026-02-17T15:14:37.283186308Z TargetRevision: (int32) 3, 2026-02-17T15:14:37.283186308Z LastFailedRevision: (int32) 1, 2026-02-17T15:14:37.283186308Z LastFailedTime: (*v1.Time)(0xc002bc49f0)(2026-02-17 15:13:53 +0000 UTC), 2026-02-17T15:14:37.283186308Z LastFailedReason: (string) (len=15) "InstallerFailed", 2026-02-17T15:14:37.283186308Z LastFailedCount: (int) 1, 2026-02-17T15:14:37.283186308Z LastFallbackCount: (int) 0, 2026-02-17T15:14:37.283186308Z LastFailedRevisionErrors: ([]string) (len=1 cap=1) { 2026-02-17T15:14:37.283186308Z (string) (len=2059) "installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) ,\n KubeletVersion: (string) \"\"\n})\nI0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0\nI0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0217 15:03:37.913332 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:03:37.913342 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0\nF0217 15:04:21.928422 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n" 2026-02-17T15:14:37.283186308Z } 2026-02-17T15:14:37.283186308Z } 2026-02-17T15:14:37.283186308Z because new revision pending 2026-02-17T15:14:37.292567422Z W0217 15:14:37.288853 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:14:37.292567422Z W0217 15:14:37.288897 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:14:37.292567422Z W0217 15:14:37.288912 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-17T15:14:37.292567422Z W0217 15:14:37.288925 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:14:37.292567422Z W0217 15:14:37.288936 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-17T15:14:37.360049586Z I0217 15:14:37.359958 1 prune_controller.go:277] Nothing to prune 2026-02-17T15:14:37.362189199Z I0217 15:14:37.362068 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:02:39Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:33Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:02:40Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:02:39Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:39Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:14:37.363752408Z I0217 15:14:37.363690 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. 2026-02-17T15:14:37.386791576Z I0217 15:14:37.386649 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3" 2026-02-17T15:14:38.472089887Z I0217 15:14:38.471990 1 request.go:700] Waited for 1.122264488s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver 2026-02-17T15:14:39.472339825Z I0217 15:14:39.472186 1 request.go:700] Waited for 1.796213173s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/client-ca 2026-02-17T15:14:40.672394744Z I0217 15:14:40.672303 1 request.go:700] Waited for 1.195592948s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-server-ca 2026-02-17T15:14:41.683624628Z I0217 15:14:41.683550 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"75d3650d-6ba1-411d-a9c8-ef63b3e863d6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-3-master-0 -n openshift-kube-apiserver because it was missing 2026-02-17T15:14:41.872169287Z I0217 15:14:41.872052 1 request.go:700] Waited for 1.195556607s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/trusted-ca-bundle 2026-02-17T15:14:42.074705607Z I0217 15:14:42.074627 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Pending phase 2026-02-17T15:14:45.084019836Z I0217 15:14:45.083955 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:46.476867211Z I0217 15:14:46.476780 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:47.871615444Z I0217 15:14:47.871532 1 request.go:700] Waited for 1.079639399s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/installer-sa 2026-02-17T15:14:48.871754839Z I0217 15:14:48.871670 1 request.go:700] Waited for 1.394118446s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/installer-3-master-0 2026-02-17T15:14:49.875110115Z I0217 15:14:49.875010 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:14:50.072288350Z I0217 15:14:50.072171 1 request.go:700] Waited for 1.176494968s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver 2026-02-17T15:14:51.675585643Z I0217 15:14:51.675508 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-02-17T15:15:06.705310106Z I0217 15:15:06.704950 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. kube-apiserver-operator_previous.log0000640000000000000000000000243415145103004037134 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-54984b6678-p5mdv2026-02-17T15:07:18.125255950Z I0217 15:07:18.125070 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:07:18.125255950Z I0217 15:07:18.125188 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:07:18.125734852Z I0217 15:07:18.125681 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:18.305777237Z W0217 15:08:18.305641 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-apiserver-operator-54984b6678) 2026-02-17T15:08:18.305989873Z I0217 15:08:18.305929 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-17T15:08:48.687734818Z F0217 15:08:48.687655 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock": context deadline exceeded config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv.json0000640000000000000000000001601515145103004027726 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-54984b6678-p5mdv","generateName":"kube-apiserver-operator-54984b6678-","namespace":"openshift-kube-apiserver-operator","uid":"e259b5a1-837b-4cde-85f7-cd5781af08bd","resourceVersion":"9506","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"54984b6678"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-54984b6678","uid":"5c5a86e1-eff8-4f41-8119-d2cc362b753a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:13Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:13Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-02-17T15:09:13Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.125070 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.125188 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.125681 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.305641 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-apiserver-operator-54984b6678)\nI0217 15:08:18.305929 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af\nF0217 15:08:48.687655 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:18Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://c37b7a8b6b89d90619e0434b3f19d1c552551ee3029bb3ef42107c3c450c9cb1"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://0b8262975cf51c409ae05462f6db811ce0d8908ad2a83500403ab60076ef6470","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007240215145103004025170 0ustar00000000000000002026-02-17T15:03:54.725165056Z set -euo pipefail 2026-02-17T15:03:54.725165056Z 2026-02-17T15:03:54.725165056Z cluster-etcd-operator rev \ 2026-02-17T15:03:54.725165056Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-02-17T15:03:54.725165056Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-02-17T15:03:54.725165056Z --client-key-file=$(ETCDCTL_KEY) \ 2026-02-17T15:03:54.725165056Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-02-17T15:03:54.725165056Z securityContext: 2026-02-17T15:03:54.725165056Z privileged: true 2026-02-17T15:03:54.725165056Z resources: 2026-02-17T15:03:54.725165056Z requests: 2026-02-17T15:03:54.725165056Z memory: 50Mi 2026-02-17T15:03:54.725165056Z cpu: 10m 2026-02-17T15:03:54.725165056Z env: 2026-02-17T15:03:54.725165056Z - name: "ALL_ETCD_ENDPOINTS" 2026-02-17T15:03:54.725165056Z value: "https://192.168.32.10:2379" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_API" 2026-02-17T15:03:54.725165056Z value: "3" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_CACERT" 2026-02-17T15:03:54.725165056Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_CERT" 2026-02-17T15:03:54.725165056Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_ENDPOINTS" 2026-02-17T15:03:54.725165056Z value: "https://192.168.32.10:2379" 2026-02-17T15:03:54.725165056Z - name: "ETCDCTL_KEY" 2026-02-17T15:03:54.725165056Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-02-17T15:03:54.725165056Z - name: "ETCD_CIPHER_SUITES" 2026-02-17T15:03:54.725165056Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-02-17T15:03:54.725165056Z - name: "ETCD_DATA_DIR" 2026-02-17T15:03:54.725165056Z value: "/var/lib/etcd" 2026-02-17T15:03:54.725165056Z - name: "ETCD_ELECTION_TIMEOUT" 2026-02-17T15:03:54.725165056Z value: "2500" 2026-02-17T15:03:54.725165056Z - name: "ETCD_ENABLE_PPROF" 2026-02-17T15:03:54.725265478Z value: "true" 2026-02-17T15:03:54.725265478Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-02-17T15:03:54.725265478Z value: "1" 2026-02-17T15:03:54.725265478Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-02-17T15:03:54.725265478Z value: "200ms" 2026-02-17T15:03:54.725265478Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-02-17T15:03:54.725265478Z value: "5s" 2026-02-17T15:03:54.725265478Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-02-17T15:03:54.725265478Z value: "500" 2026-02-17T15:03:54.725265478Z - name: "ETCD_IMAGE" 2026-02-17T15:03:54.725265478Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3" 2026-02-17T15:03:54.725265478Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-02-17T15:03:54.725265478Z value: "existing" 2026-02-17T15:03:54.725265478Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-02-17T15:03:54.725265478Z value: "8589934592" 2026-02-17T15:03:54.725265478Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-02-17T15:03:54.725265478Z value: "true" 2026-02-17T15:03:54.725265478Z - name: "ETCD_TLS_MIN_VERSION" 2026-02-17T15:03:54.725265478Z value: "TLS1.2" 2026-02-17T15:03:54.725265478Z - name: "NODE_master_0_ETCD_NAME" 2026-02-17T15:03:54.725265478Z value: "master-0" 2026-02-17T15:03:54.725265478Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-02-17T15:03:54.725265478Z value: "192.168.32.10" 2026-02-17T15:03:54.725265478Z - name: "NODE_master_0_IP" 2026-02-17T15:03:54.725265478Z value: "192.168.32.10" 2026-02-17T15:03:54.725265478Z volumeMounts: 2026-02-17T15:03:54.725265478Z - mountPath: /var/lib/etcd 2026-02-17T15:03:54.725265478Z name: data-dir 2026-02-17T15:03:54.725265478Z - mountPath: /etc/kubernetes/static-pod-certs 2026-02-17T15:03:54.725265478Z name: cert-dir 2026-02-17T15:03:54.725265478Z hostNetwork: true 2026-02-17T15:03:54.725265478Z priorityClassName: system-node-critical 2026-02-17T15:03:54.725265478Z tolerations: 2026-02-17T15:03:54.725265478Z - operator: "Exists" 2026-02-17T15:03:54.725265478Z volumes: 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /etc/kubernetes/manifests 2026-02-17T15:03:54.725265478Z name: static-pod-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-02-17T15:03:54.725265478Z name: resource-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-02-17T15:03:54.725265478Z name: cert-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /var/lib/etcd 2026-02-17T15:03:54.725265478Z type: "" 2026-02-17T15:03:54.725265478Z name: data-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /usr/local/bin 2026-02-17T15:03:54.725265478Z name: usr-local-bin 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /var/log/etcd 2026-02-17T15:03:54.725265478Z name: log-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /etc/kubernetes 2026-02-17T15:03:54.725265478Z name: config-dir 2026-02-17T15:03:54.725265478Z - hostPath: 2026-02-17T15:03:54.725265478Z path: /var/lib/etcd-auto-backup 2026-02-17T15:03:54.725265478Z name: etcd-auto-backup-dir 2026-02-17T15:03:54.739481389Z I0217 15:03:54.739098 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-02-17T15:03:54.739481389Z I0217 15:03:54.739381 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-17T15:03:54.739481389Z I0217 15:03:54.739391 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-17T15:03:54.739481389Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615145103004023465 0ustar00000000000000002026-02-17T15:07:08.062708092Z I0217 15:07:08.062263 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215145103004024162 0ustar00000000000000002026-02-17T15:06:57.781328835Z I0217 15:06:57.781007 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-02-17T15:07:07.812291471Z I0217 15:07:07.812182 1 etcdcli_pool.go:70] creating a new cached client 2026-02-17T15:07:22.811190293Z I0217 15:07:22.811063 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615145103004024341 0ustar00000000000000002026-02-17T15:06:57.449330756Z {"level":"info","ts":"2026-02-17T15:06:57.449091Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-17T15:06:57.449842509Z {"level":"info","ts":"2026-02-17T15:06:57.449804Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-02-17T15:06:57.450042284Z {"level":"info","ts":"2026-02-17T15:06:57.450003Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-17T15:06:57.450159297Z {"level":"info","ts":"2026-02-17T15:06:57.450107Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-02-17T15:06:57.450187577Z {"level":"info","ts":"2026-02-17T15:06:57.450165Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc00017c000/192.168.32.10:9978\""} 2026-02-17T15:06:57.450238278Z {"level":"info","ts":"2026-02-17T15:06:57.450195Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc00017c000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-02-17T15:06:57.450238278Z {"level":"info","ts":"2026-02-17T15:06:57.450228Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-02-17T15:06:57.450561166Z {"level":"info","ts":"2026-02-17T15:06:57.450522Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-02-17T15:06:57.450626968Z {"level":"info","ts":"2026-02-17T15:06:57.450581Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-02-17T15:06:57.450731120Z {"level":"info","ts":"2026-02-17T15:06:57.450656Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000408dc0 } }"} 2026-02-17T15:06:57.451440828Z {"level":"info","ts":"2026-02-17T15:06:57.450868Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-02-17T15:06:57.451768516Z {"level":"info","ts":"2026-02-17T15:06:57.451697Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:06:57.452424282Z {"level":"info","ts":"2026-02-17T15:06:57.452347Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-02-17T15:06:57.452424282Z {"level":"info","ts":"2026-02-17T15:06:57.452418Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-02-17T15:06:57.452482385Z {"level":"info","ts":"2026-02-17T15:06:57.452440Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:06:57.452571137Z {"level":"info","ts":"2026-02-17T15:06:57.452416Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:06:57.453312435Z {"level":"info","ts":"2026-02-17T15:06:57.453226Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:57.453388166Z {"level":"warn","ts":"2026-02-17T15:06:57.453318Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:57.453445098Z {"level":"info","ts":"2026-02-17T15:06:57.453406Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:57.453548750Z {"level":"info","ts":"2026-02-17T15:06:57.453513Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, TRANSIENT_FAILURE"} 2026-02-17T15:06:57.453591981Z {"level":"info","ts":"2026-02-17T15:06:57.453490Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-02-17T15:06:57.453727015Z {"level":"info","ts":"2026-02-17T15:06:57.453557Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-02-17T15:06:57.453727015Z {"level":"info","ts":"2026-02-17T15:06:57.453689Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-02-17T15:06:57.453949401Z {"level":"info","ts":"2026-02-17T15:06:57.453912Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-02-17T15:06:57.453949401Z {"level":"info","ts":"2026-02-17T15:06:57.453940Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-02-17T15:06:57.453957331Z {"level":"info","ts":"2026-02-17T15:06:57.453947Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-02-17T15:06:57.453996632Z {"level":"info","ts":"2026-02-17T15:06:57.453956Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-02-17T15:06:57.454253198Z {"level":"info","ts":"2026-02-17T15:06:57.454218Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-02-17T15:06:58.454145183Z {"level":"info","ts":"2026-02-17T15:06:58.454010Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:58.454145183Z {"level":"info","ts":"2026-02-17T15:06:58.454089Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, IDLE"} 2026-02-17T15:06:58.454223885Z {"level":"info","ts":"2026-02-17T15:06:58.454152Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:06:58.454223885Z {"level":"info","ts":"2026-02-17T15:06:58.454201Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:06:58.454435560Z {"level":"info","ts":"2026-02-17T15:06:58.454347Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:06:58.454693477Z {"level":"info","ts":"2026-02-17T15:06:58.454608Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:58.454693477Z {"level":"warn","ts":"2026-02-17T15:06:58.454661Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:58.454768518Z {"level":"info","ts":"2026-02-17T15:06:58.454700Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:06:58.454768518Z {"level":"info","ts":"2026-02-17T15:06:58.454739Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, TRANSIENT_FAILURE"} 2026-02-17T15:07:00.129693477Z {"level":"info","ts":"2026-02-17T15:07:00.129549Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:00.129693477Z {"level":"info","ts":"2026-02-17T15:07:00.129628Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, IDLE"} 2026-02-17T15:07:00.129805670Z {"level":"info","ts":"2026-02-17T15:07:00.129668Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:07:00.129805670Z {"level":"info","ts":"2026-02-17T15:07:00.129710Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:07:00.129950743Z {"level":"info","ts":"2026-02-17T15:07:00.129872Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:07:00.130199849Z {"level":"info","ts":"2026-02-17T15:07:00.130112Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:00.130199849Z {"level":"warn","ts":"2026-02-17T15:07:00.130182Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:00.130243880Z {"level":"info","ts":"2026-02-17T15:07:00.130226Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:00.130308552Z {"level":"info","ts":"2026-02-17T15:07:00.130270Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, TRANSIENT_FAILURE"} 2026-02-17T15:07:02.883341597Z {"level":"info","ts":"2026-02-17T15:07:02.883206Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:02.883341597Z {"level":"info","ts":"2026-02-17T15:07:02.883276Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, IDLE"} 2026-02-17T15:07:02.883403558Z {"level":"info","ts":"2026-02-17T15:07:02.883312Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:07:02.883403558Z {"level":"info","ts":"2026-02-17T15:07:02.883351Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:07:02.883603263Z {"level":"info","ts":"2026-02-17T15:07:02.883509Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:07:02.883881381Z {"level":"info","ts":"2026-02-17T15:07:02.883792Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:02.883881381Z {"level":"warn","ts":"2026-02-17T15:07:02.883861Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:02.883960523Z {"level":"info","ts":"2026-02-17T15:07:02.883907Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:02.883978003Z {"level":"info","ts":"2026-02-17T15:07:02.883958Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, TRANSIENT_FAILURE"} 2026-02-17T15:07:06.447643262Z {"level":"info","ts":"2026-02-17T15:07:06.447528Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-17T15:07:06.447643262Z {"level":"info","ts":"2026-02-17T15:07:06.447586Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, IDLE"} 2026-02-17T15:07:06.447719274Z {"level":"info","ts":"2026-02-17T15:07:06.447628Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-17T15:07:06.447719274Z {"level":"info","ts":"2026-02-17T15:07:06.447664Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-17T15:07:06.447889918Z {"level":"info","ts":"2026-02-17T15:07:06.447801Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, CONNECTING"} 2026-02-17T15:07:06.455922648Z {"level":"info","ts":"2026-02-17T15:07:06.455841Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-02-17T15:07:06.455969689Z {"level":"info","ts":"2026-02-17T15:07:06.455886Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0000d6ab0, READY"} 2026-02-17T15:07:06.456018480Z {"level":"info","ts":"2026-02-17T15:07:06.455987Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-02-17T15:07:06.456036131Z {"level":"info","ts":"2026-02-17T15:07:06.456018Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013727715145103004022712 0ustar00000000000000002026-02-17T15:14:15.320408332Z {"level":"info","ts":"2026-02-17T15:14:15.320326Z","caller":"traceutil/trace.go:171","msg":"trace[1094177165] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-cluster-node-tuning-operator/node-tuning-operator; range_end:; response_count:1; response_revision:11923; }","duration":"589.119286ms","start":"2026-02-17T15:14:14.731182Z","end":"2026-02-17T15:14:15.320301Z","steps":["trace[1094177165] 'agreement among raft nodes before linearized reading' (duration: 588.036599ms)"],"step_count":1} 2026-02-17T15:14:15.320408332Z {"level":"info","ts":"2026-02-17T15:14:15.319291Z","caller":"traceutil/trace.go:171","msg":"trace[1024621405] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config/ingress-operator; range_end:; response_count:1; response_revision:11923; }","duration":"262.635798ms","start":"2026-02-17T15:14:15.056631Z","end":"2026-02-17T15:14:15.319267Z","steps":["trace[1024621405] 'agreement among raft nodes before linearized reading' (duration: 262.422273ms)"],"step_count":1} 2026-02-17T15:14:15.320428172Z {"level":"info","ts":"2026-02-17T15:14:15.319224Z","caller":"traceutil/trace.go:171","msg":"trace[74710481] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-vmware-vsphere-csi-driver-operator; range_end:; response_count:1; response_revision:11923; }","duration":"287.684686ms","start":"2026-02-17T15:14:15.031521Z","end":"2026-02-17T15:14:15.319205Z","steps":["trace[74710481] 'agreement among raft nodes before linearized reading' (duration: 287.535003ms)"],"step_count":1} 2026-02-17T15:14:15.320440702Z {"level":"warn","ts":"2026-02-17T15:14:15.319300Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"212.016778ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/cluster-samples-operator\" ","response":"range_response_count:1 size:1009"} 2026-02-17T15:14:15.320440702Z {"level":"warn","ts":"2026-02-17T15:14:15.320410Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:14.731170Z","time spent":"589.221929ms","remote":"[::1]:55292","response type":"/etcdserverpb.KV/Range","request count":0,"request size":114,"response count":1,"response size":2584,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-cluster-node-tuning-operator/node-tuning-operator\" "} 2026-02-17T15:14:15.320512644Z {"level":"info","ts":"2026-02-17T15:14:15.320448Z","caller":"traceutil/trace.go:171","msg":"trace[855897159] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-samples-operator; range_end:; response_count:1; response_revision:11923; }","duration":"213.192628ms","start":"2026-02-17T15:14:15.107246Z","end":"2026-02-17T15:14:15.320439Z","steps":["trace[855897159] 'agreement among raft nodes before linearized reading' (duration: 211.989538ms)"],"step_count":1} 2026-02-17T15:14:15.320512644Z {"level":"warn","ts":"2026-02-17T15:14:15.319795Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:15.009748Z","time spent":"310.040125ms","remote":"[::1]:57486","response type":"/etcdserverpb.KV/Range","request count":0,"request size":63,"response count":1,"response size":1283,"request content":"key:\"/kubernetes.io/roles/openshift-machine-api/cluster-autoscaler\" "} 2026-02-17T15:14:15.320595206Z {"level":"info","ts":"2026-02-17T15:14:15.319657Z","caller":"traceutil/trace.go:171","msg":"trace[1830458618] range","detail":"{range_begin:/kubernetes.io/pods/openshift-kube-apiserver/kube-apiserver-master-0; range_end:; response_count:0; response_revision:11923; }","duration":"246.597625ms","start":"2026-02-17T15:14:15.073043Z","end":"2026-02-17T15:14:15.319640Z","steps":["trace[1830458618] 'agreement among raft nodes before linearized reading' (duration: 246.475992ms)"],"step_count":1} 2026-02-17T15:14:15.320595206Z {"level":"info","ts":"2026-02-17T15:14:15.319839Z","caller":"traceutil/trace.go:171","msg":"trace[1767857349] range","detail":"{range_begin:/kubernetes.io/rolebindings/kube-system/authentication-reader-for-authenticated-users; range_end:; response_count:1; response_revision:11923; }","duration":"633.021677ms","start":"2026-02-17T15:14:14.686807Z","end":"2026-02-17T15:14:15.319828Z","steps":["trace[1767857349] 'agreement among raft nodes before linearized reading' (duration: 632.517615ms)"],"step_count":1} 2026-02-17T15:14:15.323930339Z {"level":"warn","ts":"2026-02-17T15:14:15.320611Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:14.686780Z","time spent":"633.819807ms","remote":"[::1]:37506","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":578,"request content":"key:\"/kubernetes.io/rolebindings/kube-system/authentication-reader-for-authenticated-users\" "} 2026-02-17T15:14:15.323930339Z {"level":"info","ts":"2026-02-17T15:14:15.319882Z","caller":"traceutil/trace.go:171","msg":"trace[2044350013] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-etcd-operator/etcd-operator; range_end:; response_count:1; response_revision:11923; }","duration":"563.530024ms","start":"2026-02-17T15:14:14.756341Z","end":"2026-02-17T15:14:15.319871Z","steps":["trace[2044350013] 'agreement among raft nodes before linearized reading' (duration: 563.439421ms)"],"step_count":1} 2026-02-17T15:14:15.323930339Z {"level":"warn","ts":"2026-02-17T15:14:15.320753Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:14.756328Z","time spent":"564.415617ms","remote":"[::1]:34738","response type":"/etcdserverpb.KV/Range","request count":0,"request size":66,"response count":1,"response size":6821,"request content":"key:\"/kubernetes.io/deployments/openshift-etcd-operator/etcd-operator\" "} 2026-02-17T15:14:15.323930339Z {"level":"info","ts":"2026-02-17T15:14:15.319309Z","caller":"traceutil/trace.go:171","msg":"trace[539956799] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config-managed/cluster-cloud-controller-manager; range_end:; response_count:1; response_revision:11923; }","duration":"612.175885ms","start":"2026-02-17T15:14:14.707124Z","end":"2026-02-17T15:14:15.319300Z","steps":["trace[539956799] 'agreement among raft nodes before linearized reading' (duration: 612.124743ms)"],"step_count":1} 2026-02-17T15:14:15.323930339Z {"level":"warn","ts":"2026-02-17T15:14:15.320828Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:14.707076Z","time spent":"613.743564ms","remote":"[::1]:37506","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":1167,"request content":"key:\"/kubernetes.io/rolebindings/openshift-config-managed/cluster-cloud-controller-manager\" "} 2026-02-17T15:14:15.323930339Z {"level":"warn","ts":"2026-02-17T15:14:15.319796Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:14.907094Z","time spent":"412.694972ms","remote":"[::1]:37490","response type":"/etcdserverpb.KV/Range","request count":0,"request size":95,"response count":1,"response size":7928,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/preprovisioningimages.metal3.io\" "} 2026-02-17T15:14:15.323930339Z {"level":"warn","ts":"2026-02-17T15:14:15.321007Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"538.773184ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-workloads-namespace\" ","response":"range_response_count:1 size:85923"} 2026-02-17T15:14:15.323930339Z {"level":"info","ts":"2026-02-17T15:14:15.321142Z","caller":"traceutil/trace.go:171","msg":"trace[1854333486] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-workloads-namespace; range_end:; response_count:1; response_revision:11923; }","duration":"538.946568ms","start":"2026-02-17T15:14:14.782175Z","end":"2026-02-17T15:14:15.321122Z","steps":["trace[1854333486] 'agreement among raft nodes before linearized reading' (duration: 537.528192ms)"],"step_count":1} 2026-02-17T15:14:15.323930339Z {"level":"info","ts":"2026-02-17T15:14:15.321079Z","caller":"traceutil/trace.go:171","msg":"trace[1807049106] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-machine-approver/machine-approver; range_end:; response_count:1; response_revision:11923; }","duration":"164.083046ms","start":"2026-02-17T15:14:15.156981Z","end":"2026-02-17T15:14:15.321065Z","steps":["trace[1807049106] 'agreement among raft nodes before linearized reading' (duration: 164.040935ms)"],"step_count":1} 2026-02-17T15:14:15.323930339Z {"level":"warn","ts":"2026-02-17T15:14:15.321197Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:14.782151Z","time spent":"539.031099ms","remote":"[::1]:40144","response type":"/etcdserverpb.KV/Range","request count":0,"request size":96,"response count":1,"response size":85947,"request content":"key:\"/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-workloads-namespace\" "} 2026-02-17T15:14:15.327525980Z {"level":"info","ts":"2026-02-17T15:14:15.319357Z","caller":"traceutil/trace.go:171","msg":"trace[159941824] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:scc:nonroot; range_end:; response_count:1; response_revision:11923; }","duration":"488.088882ms","start":"2026-02-17T15:14:14.831244Z","end":"2026-02-17T15:14:15.319333Z","steps":["trace[159941824] 'agreement among raft nodes before linearized reading' (duration: 487.913958ms)"],"step_count":1} 2026-02-17T15:14:15.327525980Z {"level":"warn","ts":"2026-02-17T15:14:15.324180Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:14.831224Z","time spent":"492.931794ms","remote":"[::1]:55264","response type":"/etcdserverpb.KV/Range","request count":0,"request size":58,"response count":1,"response size":1216,"request content":"key:\"/kubernetes.io/clusterroles/system:openshift:scc:nonroot\" "} 2026-02-17T15:14:15.416690386Z {"level":"info","ts":"2026-02-17T15:14:15.416577Z","caller":"traceutil/trace.go:171","msg":"trace[1106081014] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/proxies/cluster; range_end:; response_count:1; response_revision:11926; }","duration":"159.368797ms","start":"2026-02-17T15:14:15.257191Z","end":"2026-02-17T15:14:15.416560Z","steps":["trace[1106081014] 'agreement among raft nodes before linearized reading' (duration: 159.317565ms)"],"step_count":1} 2026-02-17T15:14:15.416690386Z {"level":"info","ts":"2026-02-17T15:14:15.416631Z","caller":"traceutil/trace.go:171","msg":"trace[1776603125] transaction","detail":"{read_only:false; response_revision:11925; number_of_response:1; }","duration":"162.053933ms","start":"2026-02-17T15:14:15.254545Z","end":"2026-02-17T15:14:15.416599Z","steps":["trace[1776603125] 'process raft request' (duration: 161.780087ms)"],"step_count":1} 2026-02-17T15:14:15.419803435Z {"level":"info","ts":"2026-02-17T15:14:15.416685Z","caller":"traceutil/trace.go:171","msg":"trace[1989559583] range","detail":"{range_begin:/kubernetes.io/helm.openshift.io/helmchartrepositories/openshift-helm-charts; range_end:; response_count:1; response_revision:11926; }","duration":"135.714093ms","start":"2026-02-17T15:14:15.280945Z","end":"2026-02-17T15:14:15.416659Z","steps":["trace[1989559583] 'agreement among raft nodes before linearized reading' (duration: 135.552769ms)"],"step_count":1} 2026-02-17T15:14:15.419803435Z {"level":"info","ts":"2026-02-17T15:14:15.416705Z","caller":"traceutil/trace.go:171","msg":"trace[63941985] transaction","detail":"{read_only:false; response_revision:11926; number_of_response:1; }","duration":"142.677737ms","start":"2026-02-17T15:14:15.273990Z","end":"2026-02-17T15:14:15.416668Z","steps":["trace[63941985] 'process raft request' (duration: 142.38818ms)"],"step_count":1} 2026-02-17T15:14:15.419803435Z {"level":"info","ts":"2026-02-17T15:14:15.416801Z","caller":"traceutil/trace.go:171","msg":"trace[1167844967] transaction","detail":"{read_only:false; response_revision:11924; number_of_response:1; }","duration":"164.65299ms","start":"2026-02-17T15:14:15.252138Z","end":"2026-02-17T15:14:15.416791Z","steps":["trace[1167844967] 'process raft request' (duration: 164.049464ms)"],"step_count":1} 2026-02-17T15:14:15.419803435Z {"level":"info","ts":"2026-02-17T15:14:15.416811Z","caller":"traceutil/trace.go:171","msg":"trace[1561296687] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-machine-config-operator/machine-config-daemon; range_end:; response_count:1; response_revision:11926; }","duration":"165.212864ms","start":"2026-02-17T15:14:15.251570Z","end":"2026-02-17T15:14:15.416783Z","steps":["trace[1561296687] 'agreement among raft nodes before linearized reading' (duration: 165.130761ms)"],"step_count":1} 2026-02-17T15:14:15.419803435Z {"level":"info","ts":"2026-02-17T15:14:15.416840Z","caller":"traceutil/trace.go:171","msg":"trace[71721220] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/proxies/cluster; range_end:; response_count:1; response_revision:11926; }","duration":"165.386629ms","start":"2026-02-17T15:14:15.251435Z","end":"2026-02-17T15:14:15.416822Z","steps":["trace[71721220] 'agreement among raft nodes before linearized reading' (duration: 165.330328ms)"],"step_count":1} 2026-02-17T15:14:15.419803435Z {"level":"info","ts":"2026-02-17T15:14:15.416936Z","caller":"traceutil/trace.go:171","msg":"trace[1263752226] range","detail":"{range_begin:/kubernetes.io/secrets/openshift-machine-config-operator/node-bootstrapper-token; range_end:; response_count:1; response_revision:11926; }","duration":"165.786808ms","start":"2026-02-17T15:14:15.251138Z","end":"2026-02-17T15:14:15.416924Z","steps":["trace[1263752226] 'agreement among raft nodes before linearized reading' (duration: 165.730927ms)"],"step_count":1} 2026-02-17T15:14:15.419803435Z {"level":"info","ts":"2026-02-17T15:14:15.416959Z","caller":"traceutil/trace.go:171","msg":"trace[1380096786] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config/insights-operator; range_end:; response_count:1; response_revision:11926; }","duration":"165.282766ms","start":"2026-02-17T15:14:15.251652Z","end":"2026-02-17T15:14:15.416934Z","steps":["trace[1380096786] 'agreement among raft nodes before linearized reading' (duration: 165.211544ms)"],"step_count":1} 2026-02-17T15:14:41.255964731Z {"level":"info","ts":"2026-02-17T15:14:41.255693Z","caller":"traceutil/trace.go:171","msg":"trace[779490038] linearizableReadLoop","detail":"{readStateIndex:12891; appliedIndex:12890; }","duration":"148.71765ms","start":"2026-02-17T15:14:41.106952Z","end":"2026-02-17T15:14:41.255670Z","steps":["trace[779490038] 'read index received' (duration: 36.996318ms)","trace[779490038] 'applied index is now lower than readState.Index' (duration: 111.720552ms)"],"step_count":2} 2026-02-17T15:14:41.255964731Z {"level":"info","ts":"2026-02-17T15:14:41.255818Z","caller":"traceutil/trace.go:171","msg":"trace[785453337] transaction","detail":"{read_only:false; response_revision:12170; number_of_response:1; }","duration":"166.018414ms","start":"2026-02-17T15:14:41.089767Z","end":"2026-02-17T15:14:41.255786Z","steps":["trace[785453337] 'process raft request' (duration: 54.287381ms)","trace[785453337] 'compare' (duration: 111.466197ms)"],"step_count":2} 2026-02-17T15:14:41.256065994Z {"level":"info","ts":"2026-02-17T15:14:41.256000Z","caller":"traceutil/trace.go:171","msg":"trace[659292107] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-operator-lifecycle-manager/package-server-manager; range_end:; response_count:1; response_revision:12170; }","duration":"149.090709ms","start":"2026-02-17T15:14:41.106889Z","end":"2026-02-17T15:14:41.255980Z","steps":["trace[659292107] 'agreement among raft nodes before linearized reading' (duration: 149.024127ms)"],"step_count":1} 2026-02-17T15:14:41.256145616Z {"level":"info","ts":"2026-02-17T15:14:41.256063Z","caller":"traceutil/trace.go:171","msg":"trace[452491485] range","detail":"{range_begin:/kubernetes.io/clusterroles/machine-api-controllers; range_end:; response_count:1; response_revision:12170; }","duration":"124.237105ms","start":"2026-02-17T15:14:41.131809Z","end":"2026-02-17T15:14:41.256046Z","steps":["trace[452491485] 'agreement among raft nodes before linearized reading' (duration: 124.184204ms)"],"step_count":1} 2026-02-17T15:14:41.256673600Z {"level":"info","ts":"2026-02-17T15:14:41.256572Z","caller":"traceutil/trace.go:171","msg":"trace[54976222] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:12170; }","duration":"117.839637ms","start":"2026-02-17T15:14:41.138718Z","end":"2026-02-17T15:14:41.256557Z","steps":["trace[54976222] 'agreement among raft nodes before linearized reading' (duration: 117.816586ms)"],"step_count":1} 2026-02-17T15:14:41.428684794Z {"level":"info","ts":"2026-02-17T15:14:41.428547Z","caller":"traceutil/trace.go:171","msg":"trace[1696405851] linearizableReadLoop","detail":"{readStateIndex:12892; appliedIndex:12891; }","duration":"158.172637ms","start":"2026-02-17T15:14:41.270349Z","end":"2026-02-17T15:14:41.428521Z","steps":["trace[1696405851] 'read index received' (duration: 157.899951ms)","trace[1696405851] 'applied index is now lower than readState.Index' (duration: 271.496µs)"],"step_count":2} 2026-02-17T15:14:41.428751136Z {"level":"info","ts":"2026-02-17T15:14:41.428712Z","caller":"traceutil/trace.go:171","msg":"trace[22591971] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/clusterserviceversions/openshift-operator-lifecycle-manager/packageserver; range_end:; response_count:1; response_revision:12171; }","duration":"158.370763ms","start":"2026-02-17T15:14:41.270326Z","end":"2026-02-17T15:14:41.428696Z","steps":["trace[22591971] 'agreement among raft nodes before linearized reading' (duration: 158.332443ms)"],"step_count":1} 2026-02-17T15:14:41.428777256Z {"level":"info","ts":"2026-02-17T15:14:41.428660Z","caller":"traceutil/trace.go:171","msg":"trace[1539048086] transaction","detail":"{read_only:false; response_revision:12171; number_of_response:1; }","duration":"160.633329ms","start":"2026-02-17T15:14:41.267963Z","end":"2026-02-17T15:14:41.428597Z","steps":["trace[1539048086] 'process raft request' (duration: 160.29005ms)"],"step_count":1} 2026-02-17T15:14:41.429296159Z {"level":"info","ts":"2026-02-17T15:14:41.429198Z","caller":"traceutil/trace.go:171","msg":"trace[1304343368] range","detail":"{range_begin:/kubernetes.io/pods/openshift-kube-apiserver/kube-apiserver-master-0; range_end:; response_count:0; response_revision:12172; }","duration":"155.390017ms","start":"2026-02-17T15:14:41.273788Z","end":"2026-02-17T15:14:41.429178Z","steps":["trace[1304343368] 'agreement among raft nodes before linearized reading' (duration: 155.356306ms)"],"step_count":1} 2026-02-17T15:14:41.429604947Z {"level":"info","ts":"2026-02-17T15:14:41.429520Z","caller":"traceutil/trace.go:171","msg":"trace[633320415] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/kubeapiservers/cluster; range_end:; response_count:1; response_revision:12172; }","duration":"122.234305ms","start":"2026-02-17T15:14:41.307268Z","end":"2026-02-17T15:14:41.429502Z","steps":["trace[633320415] 'agreement among raft nodes before linearized reading' (duration: 122.066931ms)"],"step_count":1} 2026-02-17T15:14:41.429685229Z {"level":"info","ts":"2026-02-17T15:14:41.429576Z","caller":"traceutil/trace.go:171","msg":"trace[2041838586] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-csi-main-attacher-role; range_end:; response_count:1; response_revision:12172; }","duration":"147.854697ms","start":"2026-02-17T15:14:41.281660Z","end":"2026-02-17T15:14:41.429515Z","steps":["trace[2041838586] 'agreement among raft nodes before linearized reading' (duration: 147.705364ms)"],"step_count":1} 2026-02-17T15:14:41.429736810Z {"level":"info","ts":"2026-02-17T15:14:41.429672Z","caller":"traceutil/trace.go:171","msg":"trace[1036492470] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/metrics-server; range_end:; response_count:1; response_revision:12172; }","duration":"132.966215ms","start":"2026-02-17T15:14:41.296685Z","end":"2026-02-17T15:14:41.429651Z","steps":["trace[1036492470] 'agreement among raft nodes before linearized reading' (duration: 132.921094ms)"],"step_count":1} 2026-02-17T15:14:41.585864556Z {"level":"info","ts":"2026-02-17T15:14:41.585730Z","caller":"traceutil/trace.go:171","msg":"trace[1562488109] linearizableReadLoop","detail":"{readStateIndex:12894; appliedIndex:12893; }","duration":"138.616086ms","start":"2026-02-17T15:14:41.447092Z","end":"2026-02-17T15:14:41.585708Z","steps":["trace[1562488109] 'read index received' (duration: 108.813438ms)","trace[1562488109] 'applied index is now lower than readState.Index' (duration: 29.801738ms)"],"step_count":2} 2026-02-17T15:14:41.586058591Z {"level":"info","ts":"2026-02-17T15:14:41.585948Z","caller":"traceutil/trace.go:171","msg":"trace[2060474707] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-operator-lifecycle-manager/olm-operator-serviceaccount; range_end:; response_count:1; response_revision:12173; }","duration":"138.850003ms","start":"2026-02-17T15:14:41.447067Z","end":"2026-02-17T15:14:41.585917Z","steps":["trace[2060474707] 'agreement among raft nodes before linearized reading' (duration: 138.793381ms)"],"step_count":1} 2026-02-17T15:14:41.586058591Z {"level":"info","ts":"2026-02-17T15:14:41.586029Z","caller":"traceutil/trace.go:171","msg":"trace[701041242] transaction","detail":"{read_only:false; response_revision:12173; number_of_response:1; }","duration":"139.862148ms","start":"2026-02-17T15:14:41.446149Z","end":"2026-02-17T15:14:41.586011Z","steps":["trace[701041242] 'process raft request' (duration: 109.644359ms)","trace[701041242] 'compare' (duration: 29.648215ms)"],"step_count":2} 2026-02-17T15:14:41.586265966Z {"level":"info","ts":"2026-02-17T15:14:41.586162Z","caller":"traceutil/trace.go:171","msg":"trace[1823006581] range","detail":"{range_begin:/kubernetes.io/clusterroles/machine-config-controller; range_end:; response_count:1; response_revision:12173; }","duration":"131.257533ms","start":"2026-02-17T15:14:41.454836Z","end":"2026-02-17T15:14:41.586093Z","steps":["trace[1823006581] 'agreement among raft nodes before linearized reading' (duration: 131.202041ms)"],"step_count":1} 2026-02-17T15:14:41.586594084Z {"level":"info","ts":"2026-02-17T15:14:41.586514Z","caller":"traceutil/trace.go:171","msg":"trace[1255295454] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-kube-apiserver/localhost-recovery-client; range_end:; response_count:1; response_revision:12173; }","duration":"112.895251ms","start":"2026-02-17T15:14:41.473600Z","end":"2026-02-17T15:14:41.586495Z","steps":["trace[1255295454] 'agreement among raft nodes before linearized reading' (duration: 112.816459ms)"],"step_count":1} 2026-02-17T15:14:41.586685136Z {"level":"info","ts":"2026-02-17T15:14:41.586609Z","caller":"traceutil/trace.go:171","msg":"trace[1114693419] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/proxies/cluster; range_end:; response_count:1; response_revision:12173; }","duration":"130.452642ms","start":"2026-02-17T15:14:41.456142Z","end":"2026-02-17T15:14:41.586594Z","steps":["trace[1114693419] 'agreement among raft nodes before linearized reading' (duration: 130.414551ms)"],"step_count":1} 2026-02-17T15:14:41.586781099Z {"level":"info","ts":"2026-02-17T15:14:41.586710Z","caller":"traceutil/trace.go:171","msg":"trace[376523541] range","detail":"{range_begin:/kubernetes.io/roles/openshift-vsphere-infra/host-networking-services; range_end:; response_count:1; response_revision:12173; }","duration":"105.034444ms","start":"2026-02-17T15:14:41.481657Z","end":"2026-02-17T15:14:41.586692Z","steps":["trace[376523541] 'agreement among raft nodes before linearized reading' (duration: 104.994853ms)"],"step_count":1} 2026-02-17T15:14:47.003634613Z {"level":"info","ts":"2026-02-17T15:14:47.003498Z","caller":"traceutil/trace.go:171","msg":"trace[739942437] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:scc:hostmount-anyuid-v2; range_end:; response_count:1; response_revision:12239; }","duration":"121.414005ms","start":"2026-02-17T15:14:46.882030Z","end":"2026-02-17T15:14:47.003444Z","steps":["trace[739942437] 'range keys from in-memory index tree' (duration: 121.256281ms)"],"step_count":1} 2026-02-17T15:14:47.003726945Z {"level":"info","ts":"2026-02-17T15:14:47.003635Z","caller":"traceutil/trace.go:171","msg":"trace[1165019244] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:12239; }","duration":"116.323958ms","start":"2026-02-17T15:14:46.887305Z","end":"2026-02-17T15:14:47.003629Z","steps":["trace[1165019244] 'range keys from in-memory index tree' (duration: 116.189004ms)"],"step_count":1} 2026-02-17T15:14:52.801568205Z {"level":"info","ts":"2026-02-17T15:14:52.799818Z","caller":"traceutil/trace.go:171","msg":"trace[2141280092] linearizableReadLoop","detail":"{readStateIndex:13027; appliedIndex:13026; }","duration":"167.657656ms","start":"2026-02-17T15:14:52.632132Z","end":"2026-02-17T15:14:52.799790Z","steps":["trace[2141280092] 'read index received' (duration: 167.44143ms)","trace[2141280092] 'applied index is now lower than readState.Index' (duration: 214.946µs)"],"step_count":2} 2026-02-17T15:14:52.801568205Z {"level":"info","ts":"2026-02-17T15:14:52.800247Z","caller":"traceutil/trace.go:171","msg":"trace[177962066] transaction","detail":"{read_only:false; response_revision:12269; number_of_response:1; }","duration":"177.996574ms","start":"2026-02-17T15:14:52.622184Z","end":"2026-02-17T15:14:52.800181Z","steps":["trace[177962066] 'process raft request' (duration: 177.436321ms)"],"step_count":1} 2026-02-17T15:14:52.801568205Z {"level":"info","ts":"2026-02-17T15:14:52.800334Z","caller":"traceutil/trace.go:171","msg":"trace[772545] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:12269; }","duration":"168.212449ms","start":"2026-02-17T15:14:52.632082Z","end":"2026-02-17T15:14:52.800295Z","steps":["trace[772545] 'agreement among raft nodes before linearized reading' (duration: 168.154368ms)"],"step_count":1} 2026-02-17T15:14:53.073359642Z {"level":"info","ts":"2026-02-17T15:14:53.073185Z","caller":"traceutil/trace.go:171","msg":"trace[1430269217] linearizableReadLoop","detail":"{readStateIndex:13029; appliedIndex:13027; }","duration":"273.262234ms","start":"2026-02-17T15:14:52.799901Z","end":"2026-02-17T15:14:53.073163Z","steps":["trace[1430269217] 'read index received' (duration: 273.026908ms)","trace[1430269217] 'applied index is now lower than readState.Index' (duration: 234.416µs)"],"step_count":2} 2026-02-17T15:14:53.073359642Z {"level":"info","ts":"2026-02-17T15:14:53.073244Z","caller":"traceutil/trace.go:171","msg":"trace[235309203] transaction","detail":"{read_only:false; response_revision:12271; number_of_response:1; }","duration":"291.069111ms","start":"2026-02-17T15:14:52.782152Z","end":"2026-02-17T15:14:53.073221Z","steps":["trace[235309203] 'process raft request' (duration: 290.955058ms)"],"step_count":1} 2026-02-17T15:14:53.073359642Z {"level":"info","ts":"2026-02-17T15:14:53.073310Z","caller":"traceutil/trace.go:171","msg":"trace[1477238877] transaction","detail":"{read_only:false; response_revision:12270; number_of_response:1; }","duration":"429.908103ms","start":"2026-02-17T15:14:52.643379Z","end":"2026-02-17T15:14:53.073287Z","steps":["trace[1477238877] 'process raft request' (duration: 429.560305ms)"],"step_count":1} 2026-02-17T15:14:53.073359642Z {"level":"warn","ts":"2026-02-17T15:14:53.073331Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"366.481432ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-02-17T15:14:53.073432464Z {"level":"warn","ts":"2026-02-17T15:14:53.073323Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"340.51596ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/hostfirmwaresettings.metal3.io\" ","response":"range_response_count:1 size:7120"} 2026-02-17T15:14:53.073515696Z {"level":"warn","ts":"2026-02-17T15:14:53.073419Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.643364Z","time spent":"429.992105ms","remote":"[::1]:51470","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":581,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-02-17T15:14:53.073515696Z {"level":"info","ts":"2026-02-17T15:14:53.073368Z","caller":"traceutil/trace.go:171","msg":"trace[562067202] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console/prometheus-k8s; range_end:; response_count:0; response_revision:12271; }","duration":"366.529003ms","start":"2026-02-17T15:14:52.706828Z","end":"2026-02-17T15:14:53.073357Z","steps":["trace[562067202] 'agreement among raft nodes before linearized reading' (duration: 366.460671ms)"],"step_count":1} 2026-02-17T15:14:53.073515696Z {"level":"warn","ts":"2026-02-17T15:14:53.073439Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"391.166781ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-image-registry-openstack\" ","response":"range_response_count:1 size:2440"} 2026-02-17T15:14:53.073550337Z {"level":"warn","ts":"2026-02-17T15:14:53.073513Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.706813Z","time spent":"366.689496ms","remote":"[::1]:57486","response type":"/etcdserverpb.KV/Range","request count":0,"request size":55,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" "} 2026-02-17T15:14:53.073550337Z {"level":"info","ts":"2026-02-17T15:14:53.073420Z","caller":"traceutil/trace.go:171","msg":"trace[1738165982] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/hostfirmwaresettings.metal3.io; range_end:; response_count:1; response_revision:12271; }","duration":"340.653374ms","start":"2026-02-17T15:14:52.732745Z","end":"2026-02-17T15:14:53.073399Z","steps":["trace[1738165982] 'agreement among raft nodes before linearized reading' (duration: 340.458059ms)"],"step_count":1} 2026-02-17T15:14:53.073550337Z {"level":"warn","ts":"2026-02-17T15:14:53.073507Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"287.402138ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/olmconfigs.operators.coreos.com\" ","response":"range_response_count:1 size:6941"} 2026-02-17T15:14:53.073579138Z {"level":"warn","ts":"2026-02-17T15:14:53.073529Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"316.689193ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-apiserver-operator/openshift-apiserver-operator\" ","response":"range_response_count:1 size:5690"} 2026-02-17T15:14:53.073579138Z {"level":"warn","ts":"2026-02-17T15:14:53.073557Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.732730Z","time spent":"340.819398ms","remote":"[::1]:37490","response type":"/etcdserverpb.KV/Range","request count":0,"request size":94,"response count":1,"response size":7144,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/hostfirmwaresettings.metal3.io\" "} 2026-02-17T15:14:53.073609119Z {"level":"info","ts":"2026-02-17T15:14:53.073574Z","caller":"traceutil/trace.go:171","msg":"trace[842731268] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/olmconfigs.operators.coreos.com; range_end:; response_count:1; response_revision:12271; }","duration":"287.510741ms","start":"2026-02-17T15:14:52.786048Z","end":"2026-02-17T15:14:53.073559Z","steps":["trace[842731268] 'agreement among raft nodes before linearized reading' (duration: 287.364037ms)"],"step_count":1} 2026-02-17T15:14:53.073609119Z {"level":"warn","ts":"2026-02-17T15:14:53.073583Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"435.893194ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-02-17T15:14:53.073630079Z {"level":"info","ts":"2026-02-17T15:14:53.073590Z","caller":"traceutil/trace.go:171","msg":"trace[1206079911] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-apiserver-operator/openshift-apiserver-operator; range_end:; response_count:1; response_revision:12271; }","duration":"316.788116ms","start":"2026-02-17T15:14:52.756786Z","end":"2026-02-17T15:14:53.073574Z","steps":["trace[1206079911] 'agreement among raft nodes before linearized reading' (duration: 316.642712ms)"],"step_count":1} 2026-02-17T15:14:53.073650610Z {"level":"info","ts":"2026-02-17T15:14:53.073618Z","caller":"traceutil/trace.go:171","msg":"trace[318911684] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:12271; }","duration":"435.958565ms","start":"2026-02-17T15:14:52.637649Z","end":"2026-02-17T15:14:53.073607Z","steps":["trace[318911684] 'agreement among raft nodes before linearized reading' (duration: 435.900333ms)"],"step_count":1} 2026-02-17T15:14:53.073675511Z {"level":"warn","ts":"2026-02-17T15:14:53.073596Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"426.959158ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/images/\" range_end:\"/kubernetes.io/config.openshift.io/images0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-02-17T15:14:53.073696221Z {"level":"info","ts":"2026-02-17T15:14:53.073524Z","caller":"traceutil/trace.go:171","msg":"trace[1816197884] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-image-registry-openstack; range_end:; response_count:1; response_revision:12271; }","duration":"391.274793ms","start":"2026-02-17T15:14:52.682230Z","end":"2026-02-17T15:14:53.073505Z","steps":["trace[1816197884] 'agreement among raft nodes before linearized reading' (duration: 391.158921ms)"],"step_count":1} 2026-02-17T15:14:53.073696221Z {"level":"warn","ts":"2026-02-17T15:14:53.073647Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"417.250225ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-02-17T15:14:53.073791203Z {"level":"warn","ts":"2026-02-17T15:14:53.073696Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.682211Z","time spent":"391.472719ms","remote":"[::1]:51526","response type":"/etcdserverpb.KV/Range","request count":0,"request size":137,"response count":1,"response size":2464,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-image-registry-openstack\" "} 2026-02-17T15:14:53.073791203Z {"level":"info","ts":"2026-02-17T15:14:53.073714Z","caller":"traceutil/trace.go:171","msg":"trace[1858990913] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console-operator/prometheus-k8s; range_end:; response_count:0; response_revision:12271; }","duration":"417.333427ms","start":"2026-02-17T15:14:52.656362Z","end":"2026-02-17T15:14:53.073696Z","steps":["trace[1858990913] 'agreement among raft nodes before linearized reading' (duration: 417.233525ms)"],"step_count":1} 2026-02-17T15:14:53.073791203Z {"level":"warn","ts":"2026-02-17T15:14:53.073636Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.756752Z","time spent":"316.871068ms","remote":"[::1]:34738","response type":"/etcdserverpb.KV/Range","request count":0,"request size":86,"response count":1,"response size":5714,"request content":"key:\"/kubernetes.io/deployments/openshift-apiserver-operator/openshift-apiserver-operator\" "} 2026-02-17T15:14:53.073791203Z {"level":"warn","ts":"2026-02-17T15:14:53.073747Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"437.229827ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/v1.project.openshift.io\" ","response":"range_response_count:1 size:3447"} 2026-02-17T15:14:53.073791203Z {"level":"warn","ts":"2026-02-17T15:14:53.073762Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.656354Z","time spent":"417.400129ms","remote":"[::1]:57486","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" "} 2026-02-17T15:14:53.073833344Z {"level":"info","ts":"2026-02-17T15:14:53.073792Z","caller":"traceutil/trace.go:171","msg":"trace[734876449] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.project.openshift.io; range_end:; response_count:1; response_revision:12271; }","duration":"437.291619ms","start":"2026-02-17T15:14:52.636487Z","end":"2026-02-17T15:14:53.073779Z","steps":["trace[734876449] 'agreement among raft nodes before linearized reading' (duration: 437.190347ms)"],"step_count":1} 2026-02-17T15:14:53.073860525Z {"level":"warn","ts":"2026-02-17T15:14:53.073830Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.636449Z","time spent":"437.371911ms","remote":"[::1]:51620","response type":"/etcdserverpb.KV/Range","request count":0,"request size":75,"response count":1,"response size":3471,"request content":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/v1.project.openshift.io\" "} 2026-02-17T15:14:53.073881226Z {"level":"warn","ts":"2026-02-17T15:14:53.073657Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.637634Z","time spent":"436.013027ms","remote":"[::1]:44224","response type":"/etcdserverpb.KV/Range","request count":0,"request size":48,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 "} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.073933Z","caller":"traceutil/trace.go:171","msg":"trace[1859522778] transaction","detail":"{read_only:false; response_revision:12272; number_of_response:1; }","duration":"197.012661ms","start":"2026-02-17T15:14:52.876903Z","end":"2026-02-17T15:14:53.073916Z","steps":["trace[1859522778] 'process raft request' (duration: 196.94518ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"warn","ts":"2026-02-17T15:14:53.074174Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"261.155361ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-cluster-version/cluster-version-operator\" ","response":"range_response_count:1 size:6516"} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074206Z","caller":"traceutil/trace.go:171","msg":"trace[1873209287] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-version/cluster-version-operator; range_end:; response_count:1; response_revision:12272; }","duration":"261.221142ms","start":"2026-02-17T15:14:52.812974Z","end":"2026-02-17T15:14:53.074195Z","steps":["trace[1873209287] 'agreement among raft nodes before linearized reading' (duration: 261.152081ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074219Z","caller":"traceutil/trace.go:171","msg":"trace[419663281] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:scc:nonroot-v2; range_end:; response_count:1; response_revision:12272; }","duration":"192.389915ms","start":"2026-02-17T15:14:52.881809Z","end":"2026-02-17T15:14:53.074199Z","steps":["trace[419663281] 'agreement among raft nodes before linearized reading' (duration: 192.349374ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074224Z","caller":"traceutil/trace.go:171","msg":"trace[1506516315] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:12272; }","duration":"102.505941ms","start":"2026-02-17T15:14:52.971702Z","end":"2026-02-17T15:14:53.074208Z","steps":["trace[1506516315] 'agreement among raft nodes before linearized reading' (duration: 102.46959ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074304Z","caller":"traceutil/trace.go:171","msg":"trace[185169531] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:12272; }","duration":"102.86892ms","start":"2026-02-17T15:14:52.971427Z","end":"2026-02-17T15:14:53.074296Z","steps":["trace[185169531] 'agreement among raft nodes before linearized reading' (duration: 102.839019ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074235Z","caller":"traceutil/trace.go:171","msg":"trace[1726466756] range","detail":"{range_begin:/kubernetes.io/pods/openshift-kube-controller-manager/kube-controller-manager-master-0; range_end:; response_count:1; response_revision:12272; }","duration":"105.23867ms","start":"2026-02-17T15:14:52.968979Z","end":"2026-02-17T15:14:53.074218Z","steps":["trace[1726466756] 'agreement among raft nodes before linearized reading' (duration: 105.174268ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074306Z","caller":"traceutil/trace.go:171","msg":"trace[1521470361] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-network-operator/prometheus-k8s; range_end:; response_count:1; response_revision:12272; }","duration":"142.214947ms","start":"2026-02-17T15:14:52.932059Z","end":"2026-02-17T15:14:53.074274Z","steps":["trace[1521470361] 'agreement among raft nodes before linearized reading' (duration: 142.148066ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"warn","ts":"2026-02-17T15:14:53.074345Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"211.891774ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/machine-config-controller\" ","response":"range_response_count:1 size:1501"} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074317Z","caller":"traceutil/trace.go:171","msg":"trace[124814409] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io; range_end:; response_count:1; response_revision:12272; }","duration":"167.895662ms","start":"2026-02-17T15:14:52.906395Z","end":"2026-02-17T15:14:53.074291Z","steps":["trace[124814409] 'agreement among raft nodes before linearized reading' (duration: 167.83717ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074365Z","caller":"traceutil/trace.go:171","msg":"trace[1202082624] range","detail":"{range_begin:/kubernetes.io/clusterroles/machine-config-controller; range_end:; response_count:1; response_revision:12272; }","duration":"211.931165ms","start":"2026-02-17T15:14:52.862428Z","end":"2026-02-17T15:14:53.074359Z","steps":["trace[1202082624] 'agreement among raft nodes before linearized reading' (duration: 211.886954ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074351Z","caller":"traceutil/trace.go:171","msg":"trace[1232654890] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-controller-manager-operator/openshift-controller-manager-operator; range_end:; response_count:1; response_revision:12272; }","duration":"117.686612ms","start":"2026-02-17T15:14:52.956628Z","end":"2026-02-17T15:14:53.074315Z","steps":["trace[1232654890] 'agreement among raft nodes before linearized reading' (duration: 117.61301ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"warn","ts":"2026-02-17T15:14:53.074437Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"217.061954ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:etcd-operator\" ","response":"range_response_count:1 size:979"} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074484Z","caller":"traceutil/trace.go:171","msg":"trace[137998185] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:etcd-operator; range_end:; response_count:1; response_revision:12272; }","duration":"217.100185ms","start":"2026-02-17T15:14:52.857348Z","end":"2026-02-17T15:14:53.074448Z","steps":["trace[137998185] 'agreement among raft nodes before linearized reading' (duration: 217.066585ms)"],"step_count":1} 2026-02-17T15:14:53.074974293Z {"level":"warn","ts":"2026-02-17T15:14:53.074569Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"242.84003ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-config-operator/machine-config-daemon\" ","response":"range_response_count:1 size:7912"} 2026-02-17T15:14:53.074974293Z {"level":"info","ts":"2026-02-17T15:14:53.074608Z","caller":"traceutil/trace.go:171","msg":"trace[1577778322] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-config-operator/machine-config-daemon; range_end:; response_count:1; response_revision:12272; }","duration":"242.886502ms","start":"2026-02-17T15:14:52.831705Z","end":"2026-02-17T15:14:53.074592Z","steps":["trace[1577778322] 'agreement among raft nodes before linearized reading' (duration: 242.834851ms)"],"step_count":1} 2026-02-17T15:14:53.079070845Z {"level":"info","ts":"2026-02-17T15:14:53.073747Z","caller":"traceutil/trace.go:171","msg":"trace[182685729] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/images/; range_end:/kubernetes.io/config.openshift.io/images0; response_count:0; response_revision:12271; }","duration":"427.140674ms","start":"2026-02-17T15:14:52.646587Z","end":"2026-02-17T15:14:53.073728Z","steps":["trace[182685729] 'agreement among raft nodes before linearized reading' (duration: 426.922568ms)"],"step_count":1} 2026-02-17T15:14:53.079070845Z {"level":"warn","ts":"2026-02-17T15:14:53.075141Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-17T15:14:52.646581Z","time spent":"428.507048ms","remote":"[::1]:57470","response type":"/etcdserverpb.KV/Range","request count":0,"request size":90,"response count":1,"response size":31,"request content":"key:\"/kubernetes.io/config.openshift.io/images/\" range_end:\"/kubernetes.io/config.openshift.io/images0\" count_only:true "} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715145103004023113 0ustar00000000000000002026-02-17T15:04:23.329044184Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-865765995-c58rq/oauth-apiserver_current.log0000640000000000000000000011723015145103004030717 0ustar00000000000000002026-02-17T15:12:47.680815781Z E0217 15:12:47.680537 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:47.680956395Z E0217 15:12:47.680543 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.775304748Z E0217 15:12:52.773925 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.775304748Z E0217 15:12:52.774307 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.775304748Z E0217 15:12:52.774519 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.775304748Z E0217 15:12:52.774708 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.775304748Z E0217 15:12:52.774869 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.781186359Z E0217 15:12:52.781125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.781597239Z E0217 15:12:52.781554 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.781783024Z E0217 15:12:52.781743 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.781866776Z E0217 15:12:52.781810 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:12:52.781979889Z E0217 15:12:52.781812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.677043345Z E0217 15:13:17.676907 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.678979644Z E0217 15:13:17.678898 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.679035515Z E0217 15:13:17.678996 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.679212291Z E0217 15:13:17.679130 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.679376125Z E0217 15:13:17.678911 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.689564735Z E0217 15:13:17.689444 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.689628817Z E0217 15:13:17.689579 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.689694668Z E0217 15:13:17.689627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.689778800Z E0217 15:13:17.689746 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:17.690055807Z E0217 15:13:17.689946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.764434230Z E0217 15:13:22.764338 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.768506264Z E0217 15:13:22.764975 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.768506264Z E0217 15:13:22.765363 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.768506264Z E0217 15:13:22.765870 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.768506264Z E0217 15:13:22.765885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.774638541Z E0217 15:13:22.772960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.774638541Z E0217 15:13:22.773046 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.774638541Z E0217 15:13:22.773095 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.774638541Z E0217 15:13:22.773169 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.774638541Z E0217 15:13:22.773179 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.840662890Z E0217 15:13:22.840556 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.856709950Z E0217 15:13:22.854005 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.919299572Z E0217 15:13:22.919227 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:22.931057963Z E0217 15:13:22.930997 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.686447638Z E0217 15:13:47.686385 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.686540880Z E0217 15:13:47.686503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.686540880Z E0217 15:13:47.686523 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.686683334Z E0217 15:13:47.686654 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.686853978Z E0217 15:13:47.686503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.700313553Z E0217 15:13:47.698269 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.700313553Z E0217 15:13:47.698317 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.700313553Z E0217 15:13:47.698389 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.700313553Z E0217 15:13:47.698532 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:47.700313553Z E0217 15:13:47.698705 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.788636 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.788965 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.789136 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.789281 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.789394 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.789526 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.789746 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.790012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.790073 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:13:52.792297946Z E0217 15:13:52.790223 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.690343883Z E0217 15:14:17.690253 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.690429445Z E0217 15:14:17.690342 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.690536458Z E0217 15:14:17.690486 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.690586750Z E0217 15:14:17.690552 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.690791095Z E0217 15:14:17.690727 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.707549775Z E0217 15:14:17.705716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.707549775Z E0217 15:14:17.705910 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.707549775Z E0217 15:14:17.705943 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.707549775Z E0217 15:14:17.706013 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:17.707549775Z E0217 15:14:17.706033 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.769127381Z E0217 15:14:22.768539 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.769316985Z E0217 15:14:22.769265 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.769696405Z E0217 15:14:22.769633 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.769696405Z E0217 15:14:22.769661 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.769926620Z E0217 15:14:22.769839 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.798409325Z E0217 15:14:22.798325 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.798736173Z E0217 15:14:22.798694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.798964389Z E0217 15:14:22.798908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.803765379Z E0217 15:14:22.801290 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.803765379Z E0217 15:14:22.801330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.837554757Z E0217 15:14:22.835219 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.845646289Z E0217 15:14:22.845586 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.894174687Z E0217 15:14:22.894028 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:22.901970623Z E0217 15:14:22.901829 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.699424645Z E0217 15:14:47.699158 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.699424645Z E0217 15:14:47.699299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.699750393Z E0217 15:14:47.699568 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.701154698Z E0217 15:14:47.701122 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.701563479Z E0217 15:14:47.701534 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.717596601Z E0217 15:14:47.716770 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.717596601Z E0217 15:14:47.716799 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.717596601Z E0217 15:14:47.716819 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.717596601Z E0217 15:14:47.716878 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:47.717596601Z E0217 15:14:47.717104 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.799474503Z E0217 15:14:52.799383 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.807244377Z E0217 15:14:52.807171 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.811492154Z E0217 15:14:52.807618 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.811492154Z E0217 15:14:52.807717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.811492154Z E0217 15:14:52.807908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.811492154Z E0217 15:14:52.808159 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.811492154Z E0217 15:14:52.808166 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.811492154Z E0217 15:14:52.808429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.811492154Z E0217 15:14:52.808636 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" 2026-02-17T15:14:52.811492154Z E0217 15:14:52.808986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6171910294408227793, SKID=48:A2:93:25:DD:4C:02:42:83:80:AA:3A:7B:D0:1C:9E:D4:C9:81:CC, AKID=7F:11:9A:E6:15:09:B3:E7:0C:A5:A1:43:5E:53:42:77:B6:4C:14:12 failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-864ddd5f56-g8w2f/router_current.log0000640000000000000000000002311315145103004026756 0ustar00000000000000002026-02-17T15:14:19.981752167Z [-]has-synced failed: Router not synced 2026-02-17T15:14:20.982850917Z I0217 15:14:20.982727 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:20.982850917Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:20.982850917Z [-]has-synced failed: Router not synced 2026-02-17T15:14:21.982234114Z I0217 15:14:21.981603 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:21.982234114Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:21.982234114Z [-]has-synced failed: Router not synced 2026-02-17T15:14:22.982219185Z I0217 15:14:22.982145 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:22.982219185Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:22.982219185Z [-]has-synced failed: Router not synced 2026-02-17T15:14:23.981794806Z I0217 15:14:23.981715 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:23.981794806Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:23.981794806Z [-]has-synced failed: Router not synced 2026-02-17T15:14:24.981716086Z I0217 15:14:24.981640 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:24.981716086Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:24.981716086Z [-]has-synced failed: Router not synced 2026-02-17T15:14:25.983556344Z I0217 15:14:25.982314 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:25.983556344Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:25.983556344Z [-]has-synced failed: Router not synced 2026-02-17T15:14:26.982723885Z I0217 15:14:26.982611 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:26.982723885Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:26.982723885Z [-]has-synced failed: Router not synced 2026-02-17T15:14:27.982732367Z I0217 15:14:27.982663 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:27.982732367Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:27.982732367Z [-]has-synced failed: Router not synced 2026-02-17T15:14:28.983644782Z I0217 15:14:28.983543 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:28.983644782Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:28.983644782Z [-]has-synced failed: Router not synced 2026-02-17T15:14:29.983760126Z I0217 15:14:29.983650 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:29.983760126Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:29.983760126Z [-]has-synced failed: Router not synced 2026-02-17T15:14:30.983439539Z I0217 15:14:30.983347 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:30.983439539Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:30.983439539Z [-]has-synced failed: Router not synced 2026-02-17T15:14:31.983517293Z I0217 15:14:31.983393 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:31.983517293Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:31.983517293Z [-]has-synced failed: Router not synced 2026-02-17T15:14:32.983524045Z I0217 15:14:32.983383 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:32.983524045Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:32.983524045Z [-]has-synced failed: Router not synced 2026-02-17T15:14:33.409511849Z W0217 15:14:33.409358 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:14:33.409511849Z E0217 15:14:33.409419 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:14:33.982205173Z I0217 15:14:33.982089 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:33.982205173Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:33.982205173Z [-]has-synced failed: Router not synced 2026-02-17T15:14:34.982279887Z I0217 15:14:34.982188 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:34.982279887Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:34.982279887Z [-]has-synced failed: Router not synced 2026-02-17T15:14:35.981858088Z I0217 15:14:35.981329 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:35.981858088Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:35.981858088Z [-]has-synced failed: Router not synced 2026-02-17T15:14:36.981891101Z I0217 15:14:36.981784 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:36.981891101Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:36.981891101Z [-]has-synced failed: Router not synced 2026-02-17T15:14:37.982916768Z I0217 15:14:37.982833 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:37.982916768Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:37.982916768Z [-]has-synced failed: Router not synced 2026-02-17T15:14:38.982784907Z I0217 15:14:38.982686 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:38.982784907Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:38.982784907Z [-]has-synced failed: Router not synced 2026-02-17T15:14:39.982469810Z I0217 15:14:39.982369 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:39.982469810Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:39.982469810Z [-]has-synced failed: Router not synced 2026-02-17T15:14:40.988255677Z I0217 15:14:40.988172 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:40.988255677Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:40.988255677Z [-]has-synced failed: Router not synced 2026-02-17T15:14:41.982852043Z I0217 15:14:41.982069 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:41.982852043Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:41.982852043Z [-]has-synced failed: Router not synced 2026-02-17T15:14:42.982891416Z I0217 15:14:42.982806 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:42.982891416Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:42.982891416Z [-]has-synced failed: Router not synced 2026-02-17T15:14:43.982497848Z I0217 15:14:43.982331 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:43.982497848Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:43.982497848Z [-]has-synced failed: Router not synced 2026-02-17T15:14:44.982849999Z I0217 15:14:44.982775 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:44.982849999Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:44.982849999Z [-]has-synced failed: Router not synced 2026-02-17T15:14:45.983360324Z I0217 15:14:45.983282 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:45.983360324Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:45.983360324Z [-]has-synced failed: Router not synced 2026-02-17T15:14:46.982170825Z I0217 15:14:46.982078 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:46.982170825Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:46.982170825Z [-]has-synced failed: Router not synced 2026-02-17T15:14:47.982278739Z I0217 15:14:47.982179 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:47.982278739Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:47.982278739Z [-]has-synced failed: Router not synced 2026-02-17T15:14:48.983766359Z I0217 15:14:48.983695 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:48.983766359Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:48.983766359Z [-]has-synced failed: Router not synced 2026-02-17T15:14:49.983675758Z I0217 15:14:49.983579 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:49.983675758Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:49.983675758Z [-]has-synced failed: Router not synced 2026-02-17T15:14:50.982824648Z I0217 15:14:50.982731 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:14:50.982824648Z [-]backend-http failed: backend reported failure 2026-02-17T15:14:50.982824648Z [-]has-synced failed: Router not synced 2026-02-17T15:14:50.990238634Z E0217 15:14:50.990131 1 factory.go:130] failed to sync cache for *v1.Route shared informer 2026-02-17T15:14:50.992569272Z I0217 15:14:50.992504 1 template.go:844] "msg"="Shutdown requested, waiting 45s for new connections to cease" "logger"="router" 2026-02-17T15:14:50.996388738Z E0217 15:14:50.996304 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2026-02-17T15:14:51.053081170Z I0217 15:14:51.052948 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" config/pod/openshift-ingress/logs/router-default-864ddd5f56-g8w2f/router_previous.log0000640000000000000000000002260715145103004027157 0ustar00000000000000002026-02-17T15:11:33.982276220Z I0217 15:11:33.982206 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:33.982276220Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:33.982276220Z [-]has-synced failed: Router not synced 2026-02-17T15:11:34.982000365Z I0217 15:11:34.981936 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:34.982000365Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:34.982000365Z [-]has-synced failed: Router not synced 2026-02-17T15:11:35.982371476Z I0217 15:11:35.982243 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:35.982371476Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:35.982371476Z [-]has-synced failed: Router not synced 2026-02-17T15:11:36.983503005Z I0217 15:11:36.983383 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:36.983503005Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:36.983503005Z [-]has-synced failed: Router not synced 2026-02-17T15:11:37.983577989Z I0217 15:11:37.983523 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:37.983577989Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:37.983577989Z [-]has-synced failed: Router not synced 2026-02-17T15:11:38.982494564Z I0217 15:11:38.982355 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:38.982494564Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:38.982494564Z [-]has-synced failed: Router not synced 2026-02-17T15:11:39.982118667Z I0217 15:11:39.982053 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:39.982118667Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:39.982118667Z [-]has-synced failed: Router not synced 2026-02-17T15:11:40.982197000Z I0217 15:11:40.982120 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:40.982197000Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:40.982197000Z [-]has-synced failed: Router not synced 2026-02-17T15:11:41.981896954Z I0217 15:11:41.981790 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:41.981896954Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:41.981896954Z [-]has-synced failed: Router not synced 2026-02-17T15:11:42.982025470Z I0217 15:11:42.981971 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:42.982025470Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:42.982025470Z [-]has-synced failed: Router not synced 2026-02-17T15:11:43.981912699Z I0217 15:11:43.981837 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:43.981912699Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:43.981912699Z [-]has-synced failed: Router not synced 2026-02-17T15:11:44.982280549Z I0217 15:11:44.982210 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:44.982280549Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:44.982280549Z [-]has-synced failed: Router not synced 2026-02-17T15:11:45.982446856Z I0217 15:11:45.982404 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:45.982446856Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:45.982446856Z [-]has-synced failed: Router not synced 2026-02-17T15:11:46.982850687Z I0217 15:11:46.982806 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:46.982850687Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:46.982850687Z [-]has-synced failed: Router not synced 2026-02-17T15:11:47.982851518Z I0217 15:11:47.982803 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:47.982851518Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:47.982851518Z [-]has-synced failed: Router not synced 2026-02-17T15:11:48.982981524Z I0217 15:11:48.982929 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:48.982981524Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:48.982981524Z [-]has-synced failed: Router not synced 2026-02-17T15:11:49.982366840Z I0217 15:11:49.982305 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:49.982366840Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:49.982366840Z [-]has-synced failed: Router not synced 2026-02-17T15:11:50.983288144Z I0217 15:11:50.983187 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:50.983288144Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:50.983288144Z [-]has-synced failed: Router not synced 2026-02-17T15:11:51.982486867Z I0217 15:11:51.982363 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:51.982486867Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:51.982486867Z [-]has-synced failed: Router not synced 2026-02-17T15:11:52.983205016Z I0217 15:11:52.983090 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:52.983205016Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:52.983205016Z [-]has-synced failed: Router not synced 2026-02-17T15:11:53.982390197Z I0217 15:11:53.982335 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:53.982390197Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:53.982390197Z [-]has-synced failed: Router not synced 2026-02-17T15:11:54.982199434Z I0217 15:11:54.982147 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:54.982199434Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:54.982199434Z [-]has-synced failed: Router not synced 2026-02-17T15:11:55.983646702Z I0217 15:11:55.983512 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:55.983646702Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:55.983646702Z [-]has-synced failed: Router not synced 2026-02-17T15:11:56.984815293Z I0217 15:11:56.984446 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:56.984815293Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:56.984815293Z [-]has-synced failed: Router not synced 2026-02-17T15:11:57.981897963Z I0217 15:11:57.981826 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:57.981897963Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:57.981897963Z [-]has-synced failed: Router not synced 2026-02-17T15:11:58.982666154Z I0217 15:11:58.982542 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:58.982666154Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:58.982666154Z [-]has-synced failed: Router not synced 2026-02-17T15:11:59.982435912Z I0217 15:11:59.982331 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:11:59.982435912Z [-]backend-http failed: backend reported failure 2026-02-17T15:11:59.982435912Z [-]has-synced failed: Router not synced 2026-02-17T15:12:00.982130089Z I0217 15:12:00.982014 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:12:00.982130089Z [-]backend-http failed: backend reported failure 2026-02-17T15:12:00.982130089Z [-]has-synced failed: Router not synced 2026-02-17T15:12:01.981513466Z I0217 15:12:01.981300 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:12:01.981513466Z [-]backend-http failed: backend reported failure 2026-02-17T15:12:01.981513466Z [-]has-synced failed: Router not synced 2026-02-17T15:12:02.982642429Z I0217 15:12:02.982214 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:12:02.982642429Z [-]backend-http failed: backend reported failure 2026-02-17T15:12:02.982642429Z [-]has-synced failed: Router not synced 2026-02-17T15:12:03.982787937Z I0217 15:12:03.982639 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-17T15:12:03.982787937Z [-]backend-http failed: backend reported failure 2026-02-17T15:12:03.982787937Z [-]has-synced failed: Router not synced 2026-02-17T15:12:03.988735619Z E0217 15:12:03.988643 1 factory.go:130] failed to sync cache for *v1.Route shared informer 2026-02-17T15:12:03.990988907Z I0217 15:12:03.990922 1 template.go:844] "msg"="Shutdown requested, waiting 45s for new connections to cease" "logger"="router" 2026-02-17T15:12:03.993406638Z E0217 15:12:03.993332 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2026-02-17T15:12:04.045832730Z I0217 15:12:04.045753 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2026-02-17T15:12:48.991827362Z I0217 15:12:48.991705 1 template.go:846] "msg"="Instructing the template router to terminate" "logger"="router" 2026-02-17T15:12:49.006234231Z I0217 15:12:49.006148 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Shutting down\n" 2026-02-17T15:12:49.006234231Z I0217 15:12:49.006200 1 template.go:850] "msg"="Shutdown complete, exiting" "logger"="router" config/pod/openshift-ingress/router-default-864ddd5f56-g8w2f.json0000640000000000000000000002111315145103004023116 0ustar0000000000000000{"metadata":{"name":"router-default-864ddd5f56-g8w2f","generateName":"router-default-864ddd5f56-","namespace":"openshift-ingress","uid":"a2d6e329-7ad8-4fc2-accc-66827f11743d","resourceVersion":"11143","creationTimestamp":"2026-02-17T15:03:38Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"575d6c6cf5","pod-template-hash":"864ddd5f56"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-864ddd5f56","uid":"d5d54c49-7ca1-4267-889c-310afe52d0fc","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-8q8jf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-8q8jf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["575d6c6cf5"]}]}}]},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:10:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:09:52Z","containerStatuses":[{"name":"router","state":{"running":{"startedAt":"2026-02-17T15:12:50Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-17T15:10:04Z","finishedAt":"2026-02-17T15:12:50Z","containerID":"cri-o://fb13255312949f71c7f647e8894c0ba65b6939b0e0373e6d2aac176d8658b591"}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","containerID":"cri-o://860736c555e36eb357d7747028619f7c30730d9978a45e3a5c0a43cdd4bd9ba8","started":false,"volumeMounts":[{"name":"default-certificate","mountPath":"/etc/pki/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"stats-auth","mountPath":"/var/lib/haproxy/conf/metrics-auth","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-certs","mountPath":"/etc/pki/tls/metrics-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8q8jf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000005776315145103004037326 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-jrdqm2026-02-17T15:13:48.483842669Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:13:48.483842669Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:13:48.483842669Z > 2026-02-17T15:13:49.134815103Z E0217 15:13:49.134730 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:13:49.134815103Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:13:49.134815103Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:13:49.134815103Z > 2026-02-17T15:13:49.253884119Z I0217 15:13:49.253791 1 request.go:700] Waited for 3.575916416s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/configmaps/v4-0-config-system-service-ca 2026-02-17T15:13:50.254048497Z I0217 15:13:50.253953 1 request.go:700] Waited for 2.975736611s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication-operator/events 2026-02-17T15:13:50.422006984Z E0217 15:13:50.421936 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:13:50.422006984Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:13:50.422006984Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:13:50.422006984Z > 2026-02-17T15:13:50.831858620Z E0217 15:13:50.831803 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-17T15:13:50.855611868Z E0217 15:13:50.855553 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused" 2026-02-17T15:13:51.453797352Z I0217 15:13:51.453702 1 request.go:700] Waited for 2.795573222s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api 2026-02-17T15:13:52.460999139Z I0217 15:13:52.460679 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing 2026-02-17T15:13:52.470419131Z W0217 15:13:52.470346 1 warnings.go:70] unknown field "status.oidcClients" 2026-02-17T15:13:52.473805627Z W0217 15:13:52.473103 1 dynamic_operator_client.go:355] .status.conditions["WebhookAuthenticatorControllerDegraded"].message is missing; this will eventually be fatal 2026-02-17T15:13:52.501138427Z E0217 15:13:52.501059 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-17T15:13:52.502680996Z I0217 15:13:52.502549 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-17T15:13:43Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-17T15:03:50Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-17T15:03:00Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-17T15:03:00Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-17T15:02:59Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-17T15:13:52.521635591Z I0217 15:13:52.518376 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory" to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" 2026-02-17T15:13:52.525636743Z E0217 15:13:52.525595 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused" 2026-02-17T15:13:52.653418343Z I0217 15:13:52.653326 1 request.go:700] Waited for 1.997399911s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-router-certs 2026-02-17T15:13:52.983664231Z W0217 15:13:52.983586 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-17T15:13:52.983664231Z E0217 15:13:52.983646 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-17T15:13:52.991127392Z E0217 15:13:52.991074 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:13:52.991127392Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:13:52.991127392Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:13:52.991127392Z > 2026-02-17T15:13:53.114689233Z W0217 15:13:53.114612 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:13:53.114845847Z E0217 15:13:53.114819 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-17T15:13:53.653580340Z I0217 15:13:53.653518 1 request.go:700] Waited for 1.192824037s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication-operator/events 2026-02-17T15:13:54.653640066Z I0217 15:13:54.653543 1 request.go:700] Waited for 1.983836374s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs 2026-02-17T15:13:55.955799810Z E0217 15:13:55.955692 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-17T15:13:55.981921319Z E0217 15:13:55.981870 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused" 2026-02-17T15:13:57.303621123Z E0217 15:13:57.303414 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:13:57.303621123Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:13:57.303621123Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:13:57.303621123Z > 2026-02-17T15:13:58.120737217Z E0217 15:13:58.120640 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:13:58.120737217Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:13:58.120737217Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:13:58.120737217Z > 2026-02-17T15:13:59.630899314Z W0217 15:13:59.630802 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-17T15:13:59.630899314Z E0217 15:13:59.630864 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-17T15:14:04.586025335Z W0217 15:14:04.585920 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:14:04.586025335Z E0217 15:14:04.585989 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-17T15:14:07.287817108Z E0217 15:14:07.287693 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:07.287817108Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:07.287817108Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:07.287817108Z > 2026-02-17T15:14:16.374603763Z W0217 15:14:16.373790 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-17T15:14:16.374603763Z E0217 15:14:16.373855 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-17T15:14:16.439302065Z E0217 15:14:16.439247 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-17T15:14:16.471061692Z E0217 15:14:16.469074 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused" 2026-02-17T15:14:17.287497830Z E0217 15:14:17.287365 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:17.287497830Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:17.287497830Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:17.287497830Z > 2026-02-17T15:14:18.609094437Z E0217 15:14:18.609044 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:18.609094437Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:18.609094437Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:18.609094437Z > 2026-02-17T15:14:20.221711605Z W0217 15:14:20.221653 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:14:20.221746566Z E0217 15:14:20.221713 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-17T15:14:27.291824538Z E0217 15:14:27.291690 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:27.291824538Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:27.291824538Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:27.291824538Z > 2026-02-17T15:14:37.298927982Z E0217 15:14:37.298846 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:37.298927982Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:37.298927982Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:37.298927982Z > 2026-02-17T15:14:47.291320799Z E0217 15:14:47.291220 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:47.291320799Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:47.291320799Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:47.291320799Z > 2026-02-17T15:14:49.695926230Z W0217 15:14:49.695829 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-17T15:14:49.696107495Z E0217 15:14:49.696079 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-17T15:14:55.008542889Z W0217 15:14:55.008248 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-17T15:14:55.008542889Z E0217 15:14:55.008301 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-17T15:14:57.293256094Z E0217 15:14:57.293141 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:57.293256094Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:57.293256094Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:57.293256094Z > 2026-02-17T15:14:57.404424563Z E0217 15:14:57.404323 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-17T15:14:57.438216340Z E0217 15:14:57.438149 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused" 2026-02-17T15:14:58.338109111Z E0217 15:14:58.338022 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:58.338109111Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:58.338109111Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:58.338109111Z > 2026-02-17T15:14:58.351025695Z E0217 15:14:58.350666 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:58.351025695Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:58.351025695Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:58.351025695Z > 2026-02-17T15:14:58.385586241Z E0217 15:14:58.385512 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-17T15:14:58.385586241Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401 2026-02-17T15:14:58.385586241Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401 2026-02-17T15:14:58.385586241Z > authentication-operator_previous.log0000640000000000000000000000340415145103004037477 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-jrdqm2026-02-17T15:07:18.482130027Z Copying system trust bundle 2026-02-17T15:07:18.550959897Z W0217 15:07:18.550874 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-17T15:07:18.551167162Z I0217 15:07:18.551128 1 observer_polling.go:159] Starting file observer 2026-02-17T15:07:18.551650735Z I0217 15:07:18.551623 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-17T15:07:18.551700096Z I0217 15:07:18.551666 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-17T15:07:18.552038094Z I0217 15:07:18.552012 1 observer_polling.go:159] Starting file observer 2026-02-17T15:08:08.152219138Z I0217 15:08:08.152102 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2026-02-17T15:08:08.152308991Z W0217 15:08:08.152269 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://172.30.0.1:443/apis/apps/v1/namespaces/openshift-authentication-operator/replicasets/authentication-operator-755d954778": context canceled 2026-02-17T15:08:08.152918536Z I0217 15:08:08.152845 1 builder.go:304] cluster-authentication-operator version - 2026-02-17T15:08:08.153702865Z I0217 15:08:08.153637 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-17T15:08:08.423803747Z F0217 15:08:08.423700 1 cmd.go:182] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled config/pod/openshift-authentication-operator/authentication-operator-755d954778-jrdqm.json0000640000000000000000000002102015145103004030170 0ustar0000000000000000{"metadata":{"name":"authentication-operator-755d954778-jrdqm","generateName":"authentication-operator-755d954778-","namespace":"openshift-authentication-operator","uid":"e9b3f722-fb34-4ff5-b28b-fc24f43d85ae","resourceVersion":"8511","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"app":"authentication-operator","pod-template-hash":"755d954778"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.24/23\"],\"mac_address\":\"0a:58:0a:80:00:18\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.24/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.24\"\n ],\n \"mac\": \"0a:58:0a:80:00:18\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-755d954778","uid":"fa2b069e-8fed-48a9-93c8-7eb3c35d350c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-7nzlr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.32_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-7nzlr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:18Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:18Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.24","podIPs":[{"ip":"10.128.0.24"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-17T15:08:08Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0217 15:07:18.550874 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0217 15:07:18.551128 1 observer_polling.go:159] Starting file observer\nI0217 15:07:18.551623 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.551666 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.552012 1 observer_polling.go:159] Starting file observer\nI0217 15:08:08.152102 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller.\nW0217 15:08:08.152269 1 builder.go:272] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/apis/apps/v1/namespaces/openshift-authentication-operator/replicasets/authentication-operator-755d954778\": context canceled\nI0217 15:08:08.152845 1 builder.go:304] cluster-authentication-operator version -\nI0217 15:08:08.153637 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0217 15:08:08.423700 1 cmd.go:182] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-02-17T15:07:18Z","finishedAt":"2026-02-17T15:08:08Z","containerID":"cri-o://2e491cb15463a078f03468285bf55e7f054cca1c528834a6f29b9effbdeb75f4"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","containerID":"cri-o://e6c4e604cd376c77d1ad67bda0d96a444c6b00840760cb0d36d61ad455656dd0","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7nzlr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000004310315145103004020626 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:25Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-5c696dbdcd to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-6b56bd877c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c696dbdcd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-6b56bd877c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-588944557d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T14:56:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-588944557d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:42Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-588944557d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:42Z","reason":"SuccessfulCreate","message":"Created job collect-profiles-29522340","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c696dbdcd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"collect-profiles-29522340-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-6b56bd877c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: collect-profiles-29522340-8cp6h","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-588944557d-kjh2v","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:46Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-6b56bd877c-tk8xm","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:46Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:46Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-5c696dbdcd-t7n5b","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:48Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:00:48Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-t7n5b to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-588944557d-kjh2v to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-6b56bd877c-tk8xm to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:02:44Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.16/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 14.829s (14.829s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 14.875s (14.875s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 14.438s (14.438s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"LeaderElection","message":"package-server-manager-5c696dbdcd-t7n5b_60269097-2ec7-4e51-82ec-75bf11f805fe became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:03:39Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:08:54Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:08:55Z","reason":"LeaderElection","message":"package-server-manager-5c696dbdcd-t7n5b_89ef9d5d-9c2a-45bd-8192-30be90f5459e became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:17Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:40Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:41Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-67d4dbd88b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:41Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-67d4dbd88b-szr25","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.66/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:42Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:42Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:53Z","reason":"Created","message":"Created container: collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:53Z","reason":"Started","message":"Started container collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.71/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:58Z","reason":"SawCompletedJob","message":"Saw completed job: collect-profiles-29522340, condition: Complete","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:09:58Z","reason":"Completed","message":"Job completed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:14:41Z","reason":"NeedsReinstall","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:14:41Z","reason":"InstallCheckFailed","message":"install timeout","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:14:42Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:14:42Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:14:42Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:15:00Z","reason":"SuccessfulCreate","message":"Created pod: collect-profiles-29522355-rfrsq","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:15:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.85/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:15:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:15:00Z","reason":"SuccessfulCreate","message":"Created job collect-profiles-29522355","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:15:01Z","reason":"Created","message":"Created container: collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:15:01Z","reason":"Started","message":"Started container collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:15:03Z","reason":"SawCompletedJob","message":"Saw completed job: collect-profiles-29522355, condition: Complete","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-17T15:15:03Z","reason":"Completed","message":"Job completed","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001313115145103004015424 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:15Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-6578c4d554-6jl9n to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6578c4d554 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:15Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6578c4d554-6jl9n","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:16Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-6578c4d554-6jl9n","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6bd884947c-tdlbn","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6bd884947c to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-6578c4d554 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:19Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-6bd884947c-tdlbn to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:35Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" in 14.263s (14.263s including waiting). Image size: 584205881 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:40Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[-]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa failed: reason withheld\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-17T15:03:40Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011111115145103004017252 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T14:56:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-6d4655d9cf to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T14:56:35Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-6d4655d9cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-6d4655d9cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:00:43Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-6d4655d9cf-5f5g9","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-5f5g9 to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"LeaderElection","message":"openshift-apiserver-operator-6d4655d9cf-5f5g9_9f0f58c0-7dd4-4d2c-972b-01827ed5e736 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:09Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.32\"}] to [{\"operator\" \"4.18.32\"} {\"openshift-apiserver\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:03:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:08:49Z","reason":"BackOff","message":"Back-off restarting failed container openshift-apiserver-operator in pod openshift-apiserver-operator-6d4655d9cf-5f5g9_openshift-apiserver-operator(af61bda0-c7b4-489d-a671-eaa5299942fe)","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:09:03Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:09:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:09:03Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:14:34Z","reason":"LeaderElection","message":"openshift-apiserver-operator-6d4655d9cf-5f5g9_100c6d51-d108-493c-bd47-1cac277df48f became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:14:34Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:14:35Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-17T15:14:37Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000011441515145103004020166 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T14:56:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-7485d55966 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T14:56:34Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-7485d55966-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-7485d55966-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-7485d55966-wcpf8","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:00:46Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-wcpf8 to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-7485d55966-wcpf8_bb273c86-1924-4a1f-a542-258ee34aa707 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:23Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:24Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:27Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:32Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:32Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:33Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:38Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:44Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:50Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:53Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:03:53Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:08:48Z","reason":"BackOff","message":"Back-off restarting failed container kube-scheduler-operator-container in pod openshift-kube-scheduler-operator-7485d55966-wcpf8_openshift-kube-scheduler-operator(2b167b7b-2280-4c82-ac78-71c57aebe503)","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:09:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:09:01Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:09:01Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:45Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:45Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-7485d55966-wcpf8_ef6b415f-dd85-4f3f-9b6d-f63bfd0de491 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:45Z","reason":"StartingNewRevision","message":"new revision 5 triggered by \"required secret/localhost-recovery-client-token has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:49Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:53Z","reason":"SecretCreated","message":"Created Secret/serving-cert-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:54Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:54Z","reason":"RevisionTriggered","message":"new revision 5 triggered by \"required secret/localhost-recovery-client-token has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:13:59Z","reason":"PodCreated","message":"Created Pod/installer-5-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:14:54Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:14:54Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"kube-scheduler\" changed from \"\" to \"1.31.14\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-17T15:14:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: status.versions changed from [{\"raw-internal\" \"4.18.32\"}] to [{\"raw-internal\" \"4.18.32\"} {\"operator\" \"4.18.32\"} {\"kube-scheduler\" \"1.31.14\"}]","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000001617515145103004016341 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:16Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:16Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:16Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:25Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:39Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:03:39Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:13:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.75/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:13:50Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:13:51Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:13:51Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:13:57Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.76/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:03Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:03Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:54Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 5","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Started","message":"Started container wait-for-host-port","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Created","message":"Created container: wait-for-host-port","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Created","message":"Created container: kube-scheduler","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Started","message":"Started container kube-scheduler","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Created","message":"Created container: kube-scheduler-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Started","message":"Started container kube-scheduler-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:56Z","reason":"LeaderElection","message":"master-0_9fcf51dd-b93a-439b-8a17-62047091e959 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:56Z","reason":"Created","message":"Created container: kube-scheduler-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-17T15:14:56Z","reason":"Started","message":"Started container kube-scheduler-recovery-controller","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000657715145103004016370 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:03:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:03:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:14Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.79/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:15Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:15Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:18Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.82/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:23Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:24Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:24Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:37Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.83/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:43Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-17T15:14:43Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000027166115145103004020217 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T14:56:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-54984b6678 to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T14:56:40Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-54984b6678-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-54984b6678-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-54984b6678-p5mdv","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-p5mdv to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.19/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"LeaderElection","message":"kube-apiserver-operator-54984b6678-p5mdv_8b52e755-206f-4827-a7e2-b327c86a7e48 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Progressing changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:40Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:43Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:46Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:47Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"SecretCreateFailed","message":"Failed to create Secret/bound-service-account-signing-key -n openshift-kube-apiserver: secrets \"bound-service-account-signing-key\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:08Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_KubeSchedulerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:33Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:03:35Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:09:00Z","reason":"BackOff","message":"Back-off restarting failed container kube-apiserver-operator in pod kube-apiserver-operator-54984b6678-p5mdv_openshift-kube-apiserver-operator(e259b5a1-837b-4cde-85f7-cd5781af08bd)","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:09:13Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:09:13Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:09:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:46Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:46Z","reason":"LeaderElection","message":"kube-apiserver-operator-54984b6678-p5mdv_1eaee897-2132-4f89-8607-03e82a746573 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:46Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:46Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required secret/localhost-recovery-client-token has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:52Z","reason":"ObserveWebhookTokenAuthenticator","message":"authentication-token webhook configuration status changed from false to true","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:52Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"admission\": map[string]any{\"pluginConfig\": map[string]any{\"PodSecurity\": map[string]any{\"configuration\": map[string]any{\"defaults\": map[string]any{\"audit\": string(\"restricted\"), \"audit-version\": string(\"latest\"), \"enforce\": string(\"privileged\"), \"enforce-version\": string(\"latest\"), ...}}}, \"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{\"allowIngressIP\": bool(false), \"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"ExternalIPRangerAdmissionConfig\")}}, \"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{\"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"RestrictedEndpointsAdmissionConfig\"), \"restrictedCIDRs\": []any{string(\"10.128.0.0/16\"), string(\"172.30.0.0/16\")}}}}},\n \t\"apiServerArguments\": map[string]any{\n \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"authentication-token-webhook-config-file\": []any{\n+ \t\t\tstring(\"/etc/kubernetes/static-pod-resources/secrets/webhook-authenticator/kubeConfig\"),\n+ \t\t},\n+ \t\t\"authentication-token-webhook-version\": []any{string(\"v1\")},\n \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n \t\t\"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n \t\t... // 6 identical entries\n \t},\n \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n \t\"gracefulTerminationDuration\": string(\"15\"),\n \t... // 2 identical entries\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:53Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:53Z","reason":"InstallerPodFailed","message":"installer errors: installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0\nI0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0217 15:03:37.913332 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:03:37.913342 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0\nF0217 15:04:21.928422 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0217 15:03:37.913332 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0217 15:03:37.913342 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0217 15:04:21.928422 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:13:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:02Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-apiserver:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:04Z","reason":"SecretCreated","message":"Created Secret/etcd-client-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:07Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:08Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:09Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required secret/localhost-recovery-client-token has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:09Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/config has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:12Z","reason":"PodCreated","message":"Created Pod/installer-1-retry-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0217 15:03:37.900679 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0217 15:03:37.913283 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0217 15:03:37.913332 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0217 15:03:37.913342 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0217 15:03:37.923929 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0217 15:04:07.924752 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0217 15:04:21.928422 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\",Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:22Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:26Z","reason":"SecretCreated","message":"Created Secret/etcd-client-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:29Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:30Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:31Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:32Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/config has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-17T15:14:41Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001242715145103004014352 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.37/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:22Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:54Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 1","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:03:54Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:23Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:23Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:38Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:38Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:51Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:51Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:04:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:56Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:56Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:57Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-17T15:06:58Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000006132215145103004016201 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T14:56:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-67bf55ccdd to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T14:56:35Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-67bf55ccdd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:00:43Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-67bf55ccdd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:00:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:00:45Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-67bf55ccdd-pjm6n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-67bf55ccdd-pjm6n to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.12/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"LeaderElection","message":"etcd-operator-67bf55ccdd-pjm6n_5649cc5b-33fc-4a78-9e2b-2c538f842147 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:02:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:02Z","reason":"DefragControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:07:53Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:07:53Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:09:08Z","reason":"BackOff","message":"Back-off restarting failed container etcd-operator in pod etcd-operator-67bf55ccdd-pjm6n_openshift-etcd-operator(f2546ffc-8d0a-4010-a3bd-9e69b6dbea40)","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:09:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:09:19Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:09:19Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:14:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:14:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded changed from False to True (\"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:14:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\" to \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:14:58Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:14:58Z","reason":"LeaderElection","message":"etcd-operator-67bf55ccdd-pjm6n_c7419e44-164a-498f-a4e5-34538e217253 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:14:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:14:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-17T15:15:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443415145103004016550 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:25Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-865765995-c58rq to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:25Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-865765995-c58rq","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-865765995 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.41/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" in 6.088s (6.088s including waiting). Image size: 500175306 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:43Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:44Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-17T15:03:44Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000401415145103004015076 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:03:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:03:38Z","reason":"SuccessfulCreate","message":"Created pod: router-default-864ddd5f56-g8w2f","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:03:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-864ddd5f56 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:09:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:10:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\" in 10.541s (10.541s including waiting). Image size: 481879166 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:10:04Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:10:04Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:10:13Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-17T15:10:14Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000024360315145103004020305 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T14:56:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-755d954778 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T14:56:36Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:00:42Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:00:44Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-755d954778-jrdqm","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:36Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-755d954778-jrdqm to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:56Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:57Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" in 1.149s (1.149s including waiting). Image size: 508050651 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"LeaderElection","message":"authentication-operator-755d954778-jrdqm_f33a88bc-e211-4cb3-ba23-73187e0e1c33 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:02:59Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-ddq7l\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-ddq7l\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:05Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:11Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:14Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:18Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:22Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:31Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:03:46Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:06:59Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.24:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:06:59Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.24:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:58Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.24:8443/healthz\": dial tcp 10.128.0.24:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:07:58Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.24:8443/healthz\": dial tcp 10.128.0.24:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:13:43Z","reason":"LeaderElection","message":"authentication-operator-755d954778-jrdqm_0328707b-bb61-45ee-90c8-5dd2a42255c3 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:13:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:13:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:13:47Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:13:48Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:13:52Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-17T15:13:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.180.229:443/healthz\\\": dial tcp 172.30.180.229:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015145103004016261 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-17T15:03:38Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-17T15:03:38Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003570215145103001014575 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":349,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015145103000014060 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000003444015145102765014544 0ustar0000000000000000Feb 17 15:13:43.192348 master-0 kubenswrapper[8018]: E0217 15:13:43.192228 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="unmounted volumes=[cloud-credential-operator-serving-cert], unattached volumes=[], failed to process volumes=[]: context deadline exceeded" pod="openshift-cloud-credential-operator/cloud-credential-operator-595c8f9ff-p8hbc" podUID="c97d328c-95b6-4511-aa90-531ab42b9653" Feb 17 15:13:44.198226 master-0 kubenswrapper[8018]: E0217 15:13:44.198106 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="unmounted volumes=[samples-operator-tls], unattached volumes=[], failed to process volumes=[]: context deadline exceeded" pod="openshift-cluster-samples-operator/cluster-samples-operator-f8cbff74c-hr9g4" podUID="6b7d1adb-b23b-4702-be7d-27e818e8fd63" Feb 17 15:13:45.114742 master-0 kubenswrapper[8018]: E0217 15:13:45.114648 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:13:45.117014 master-0 kubenswrapper[8018]: E0217 15:13:45.116917 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:13:45.119107 master-0 kubenswrapper[8018]: E0217 15:13:45.119040 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:13:45.119214 master-0 kubenswrapper[8018]: E0217 15:13:45.119118 8018 prober.go:104] "Probe errored" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" probeType="Readiness" pod="openshift-multus/cni-sysctl-allowlist-ds-kl9jm" podUID="9501c813-f993-4916-94fc-878138ac027b" containerName="kube-multus-additional-cni-plugins" Feb 17 15:13:46.211201 master-0 kubenswrapper[8018]: E0217 15:13:46.211131 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="unmounted volumes=[cert], unattached volumes=[], failed to process volumes=[]: context deadline exceeded" pod="openshift-machine-api/cluster-autoscaler-operator-67fd9768b5-6dzpr" podUID="c8646e5c-c2ce-48e6-b757-58044769f479" Feb 17 15:13:46.439879 master-0 kubenswrapper[8018]: E0217 15:13:46.439707 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c_openshift-cloud-controller-manager-operator(14723cb7-2d96-42b7-b559-70386c4c841c)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c" podUID="14723cb7-2d96-42b7-b559-70386c4c841c" Feb 17 15:13:48.225178 master-0 kubenswrapper[8018]: E0217 15:13:48.225123 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="unmounted volumes=[machine-api-operator-tls], unattached volumes=[], failed to process volumes=[]: context deadline exceeded" pod="openshift-machine-api/machine-api-operator-bd7dd5c46-g6fgz" podUID="655e4000-0ad4-4349-8c31-e0c952e4be30" Feb 17 15:13:55.113804 master-0 kubenswrapper[8018]: E0217 15:13:55.113535 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:13:55.114934 master-0 kubenswrapper[8018]: E0217 15:13:55.114868 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:13:55.116941 master-0 kubenswrapper[8018]: E0217 15:13:55.116854 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:13:55.117054 master-0 kubenswrapper[8018]: E0217 15:13:55.116963 8018 prober.go:104] "Probe errored" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" probeType="Readiness" pod="openshift-multus/cni-sysctl-allowlist-ds-kl9jm" podUID="9501c813-f993-4916-94fc-878138ac027b" containerName="kube-multus-additional-cni-plugins" Feb 17 15:13:59.440638 master-0 kubenswrapper[8018]: E0217 15:13:59.440569 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c_openshift-cloud-controller-manager-operator(14723cb7-2d96-42b7-b559-70386c4c841c)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c" podUID="14723cb7-2d96-42b7-b559-70386c4c841c" Feb 17 15:14:02.627103 master-0 kubenswrapper[8018]: E0217 15:14:02.627038 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="unmounted volumes=[prometheus-operator-tls], unattached volumes=[], failed to process volumes=[]: context deadline exceeded" pod="openshift-monitoring/prometheus-operator-7485d645b8-nzz2j" podUID="784b804f-6bcf-4cbd-a19e-9b1fa244354e" Feb 17 15:14:05.114560 master-0 kubenswrapper[8018]: E0217 15:14:05.114362 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:14:05.116542 master-0 kubenswrapper[8018]: E0217 15:14:05.116474 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:14:05.118977 master-0 kubenswrapper[8018]: E0217 15:14:05.118873 8018 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" cmd=["/bin/bash","-c","test -f /ready/ready"] Feb 17 15:14:05.119168 master-0 kubenswrapper[8018]: E0217 15:14:05.118990 8018 prober.go:104] "Probe errored" err="rpc error: code = Unknown desc = command error: cannot register an exec PID: container is stopping, stdout: , stderr: , exit code -1" probeType="Readiness" pod="openshift-multus/cni-sysctl-allowlist-ds-kl9jm" podUID="9501c813-f993-4916-94fc-878138ac027b" containerName="kube-multus-additional-cni-plugins" Feb 17 15:14:08.992473 master-0 kubenswrapper[8018]: E0217 15:14:08.992412 8018 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c\": container with ID starting with 172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c not found: ID does not exist" containerID="172215d71309d64e20a3f0e330edf39f5e0f57d832dd537817f7abdf9953ab7c" Feb 17 15:14:10.285152 master-0 kubenswrapper[8018]: E0217 15:14:10.284552 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="9501c813-f993-4916-94fc-878138ac027b" containerName="kube-multus-additional-cni-plugins" Feb 17 15:14:10.441327 master-0 kubenswrapper[8018]: E0217 15:14:10.441287 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c_openshift-cloud-controller-manager-operator(14723cb7-2d96-42b7-b559-70386c4c841c)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c" podUID="14723cb7-2d96-42b7-b559-70386c4c841c" Feb 17 15:14:10.503762 master-0 kubenswrapper[8018]: E0217 15:14:10.503725 8018 secret.go:189] Couldn't get secret openshift-monitoring/openshift-state-metrics-tls: secret "openshift-state-metrics-tls" not found Feb 17 15:14:10.503820 master-0 kubenswrapper[8018]: E0217 15:14:10.503807 8018 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/cdbde712-c8dd-4011-adcb-af895abce94c-openshift-state-metrics-tls podName:cdbde712-c8dd-4011-adcb-af895abce94c nodeName:}" failed. No retries permitted until 2026-02-17 15:14:11.003774483 +0000 UTC m=+683.756117533 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "openshift-state-metrics-tls" (UniqueName: "kubernetes.io/secret/cdbde712-c8dd-4011-adcb-af895abce94c-openshift-state-metrics-tls") pod "openshift-state-metrics-546cc7d765-b4xl8" (UID: "cdbde712-c8dd-4011-adcb-af895abce94c") : secret "openshift-state-metrics-tls" not found Feb 17 15:14:17.353412 master-0 kubenswrapper[8018]: E0217 15:14:17.353392 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="6b25a72d-965f-415c-abc9-09612859e9e0" containerName="multus-admission-controller" Feb 17 15:14:17.356268 master-0 kubenswrapper[8018]: E0217 15:14:17.353736 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="6b25a72d-965f-415c-abc9-09612859e9e0" containerName="kube-rbac-proxy" Feb 17 15:14:22.440522 master-0 kubenswrapper[8018]: E0217 15:14:22.440356 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c_openshift-cloud-controller-manager-operator(14723cb7-2d96-42b7-b559-70386c4c841c)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c" podUID="14723cb7-2d96-42b7-b559-70386c4c841c" Feb 17 15:14:22.888507 master-0 kubenswrapper[8018]: E0217 15:14:22.888485 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="ee3c8b34-0581-45d6-a8ff-3959d5651eba" containerName="installer" Feb 17 15:14:37.447709 master-0 kubenswrapper[8018]: E0217 15:14:37.447663 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c_openshift-cloud-controller-manager-operator(14723cb7-2d96-42b7-b559-70386c4c841c)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c" podUID="14723cb7-2d96-42b7-b559-70386c4c841c" Feb 17 15:14:38.035817 master-0 kubenswrapper[8018]: E0217 15:14:38.035515 8018 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"36b549abcfeff24571cfa5a9f9adc7c9fb7611813e7951cc95b9bc105fb7185e\": container with ID starting with 36b549abcfeff24571cfa5a9f9adc7c9fb7611813e7951cc95b9bc105fb7185e not found: ID does not exist" containerID="36b549abcfeff24571cfa5a9f9adc7c9fb7611813e7951cc95b9bc105fb7185e" Feb 17 15:14:41.690407 master-0 kubenswrapper[8018]: E0217 15:14:41.690372 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="0c360914-72ac-4400-83b1-2cfb3ad10f3b" containerName="installer" Feb 17 15:14:47.094620 master-0 kubenswrapper[8018]: E0217 15:14:47.094559 8018 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"55f2fdee336abd079fe6cac03e4ec155db892d11423020e530a6211947e92857\": container with ID starting with 55f2fdee336abd079fe6cac03e4ec155db892d11423020e530a6211947e92857 not found: ID does not exist" containerID="55f2fdee336abd079fe6cac03e4ec155db892d11423020e530a6211947e92857" Feb 17 15:14:52.441229 master-0 kubenswrapper[8018]: E0217 15:14:52.440654 8018 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c_openshift-cloud-controller-manager-operator(14723cb7-2d96-42b7-b559-70386c4c841c)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c" podUID="14723cb7-2d96-42b7-b559-70386c4c841c" Feb 17 15:14:54.599898 master-0 kubenswrapper[8018]: E0217 15:14:54.599847 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2d356564-2127-4da8-9074-13dd40019e26" containerName="installer" Feb 17 15:14:54.600081 master-0 kubenswrapper[8018]: E0217 15:14:54.599919 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="9460ca0802075a8a6a10d7b3e6052c4d" containerName="kube-scheduler" Feb 17 15:14:54.600081 master-0 kubenswrapper[8018]: E0217 15:14:54.599982 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="9460ca0802075a8a6a10d7b3e6052c4d" containerName="kube-scheduler" Feb 17 15:14:58.188632 master-0 kubenswrapper[8018]: E0217 15:14:58.187898 8018 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="69b452fc-5e99-4947-a722-e47a602ac144" containerName="installer"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215145102765020136 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-9756454e8727157d80899d278483e5d2.json0000640000000000000000000004054015145102765023376 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-17T15:09:57Z","generation":1,"name":"rendered-worker-9756454e8727157d80899d278483e5d2","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"bd2f53b2-c8a8-4302-9fa7-524e1e3b77c3"}],"resourceVersion":"10558","uid":"c4165723-e0ab-4d76-bbe8-44e417bd3f28"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/machineconfigs/rendered-master-df68dbacb4242702506774288173e62e.json0000640000000000000000000004333015145102765023611 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-17T15:09:57Z","generation":1,"name":"rendered-master-df68dbacb4242702506774288173e62e","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"31e31006-613e-4b3c-9bbb-e88cf59939ce"}],"resourceVersion":"10557","uid":"13c87861-ca16-44c3-9805-cfbb4a5c7bab"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/running_containers.json0000640000000000000000000001225115145102765015314 0ustar0000000000000000{"images":{"0":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","1":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","10":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","11":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","12":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","13":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","14":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","15":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","16":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","17":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","18":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","19":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","2":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","20":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","21":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","22":"sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","23":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","24":"sha256:9899b0f08b1202d149e16f09616ee7b8f37e3cda642386d93a6d3f63d72a316b","25":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","26":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","27":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","28":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","29":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","3":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","30":"sha256:9e96b53e74d1b802c2e63544e4689c9d262e9c996902c6e8a7f3ca34b23fdd50","31":"registry.redhat.io/redhat/community-operator-index:v4.18","32":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","33":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","34":"registry.redhat.io/redhat/certified-operator-index:v4.18","35":"registry.redhat.io/redhat/redhat-operator-index:v4.18","36":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","37":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","38":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","39":"sha256:3f08586dd67c2d3d21053a044138f1bbedceb0847f1af8c3aa76127d86135a58","4":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","40":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","41":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","42":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","43":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","44":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","45":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","46":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","47":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","48":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","49":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","5":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","50":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","51":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","52":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","53":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","54":"sha256:c1a0aba9ead3a33353dc8a033699dfa4795f4050516677dad6ed4ac664094692","55":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","56":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","57":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","58":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","59":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","6":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","60":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","61":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","7":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","8":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","9":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},"containers":{"2026-02":{"0":22,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":7,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":5,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"57":1,"58":1,"59":1,"6":4,"60":1,"61":1,"7":3,"8":3,"9":2}}}config/pod/openshift-service-ca-operator/service-ca-operator-5dc4688546-sg75p.json0000640000000000000000000001615515145102765026126 0ustar0000000000000000{"metadata":{"name":"service-ca-operator-5dc4688546-sg75p","generateName":"service-ca-operator-5dc4688546-","namespace":"openshift-service-ca-operator","uid":"65d9f008-7777-48fe-85fe-9d54a7bbcea9","resourceVersion":"9533","creationTimestamp":"2026-02-17T15:00:43Z","labels":{"app":"service-ca-operator","pod-template-hash":"5dc4688546"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-operator-5dc4688546","uid":"205bf319-8062-45a2-a167-5ca60164b75e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"service-ca-operator-config","defaultMode":420}},{"name":"kube-api-access-9g7zh","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","command":["service-ca-operator","operator"],"args":["--config=/var/run/configmaps/config/operator-config.yaml","-v=2"],"env":[{"name":"CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-9g7zh","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca-operator","serviceAccount":"service-ca-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c7"},"runAsUser":1001,"runAsGroup":1001,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"service-ca-operator","state":{"running":{"startedAt":"2026-02-17T15:09:16Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.083992 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.084127 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.085025 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0217 15:07:18.085054 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0217 15:07:18.085393 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.310274 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps service-ca-operator-5dc4688546)\nI0217 15:08:18.310516 1 builder.go:304] service-ca-operator version -\nI0217 15:08:18.311392 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0217 15:08:48.736975 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-service-ca-operator/leases/service-ca-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:17Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://29887de882fd8a3a22e87156cef67aeb00ac494c3b04550882c5426a5a9c25ec"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","containerID":"cri-o://50d813c00eb4ee20e7e4a0770f94362bd89a3e9a431dc0d899c42e55cc8f993e","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-9g7zh","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-route-controller-manager/route-controller-manager-6978b88779-vp5tv.json0000640000000000000000000001730615145102765030340 0ustar0000000000000000{"metadata":{"name":"route-controller-manager-6978b88779-vp5tv","generateName":"route-controller-manager-6978b88779-","namespace":"openshift-route-controller-manager","uid":"3db03cef-d297-4bf7-8e52-dd0b18882d07","resourceVersion":"8925","creationTimestamp":"2026-02-17T15:03:38Z","labels":{"app":"route-controller-manager","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"6978b88779","route-controller-manager":"true"},"annotations":{"configmaps/client-ca":"5870","configmaps/config":"6986","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.52/23\"],\"mac_address\":\"0a:58:0a:80:00:34\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.52/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.52\"\n ],\n \"mac\": \"0a:58:0a:80:00:34\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"route-controller-manager-6978b88779","uid":"158f60ca-9dcc-4ea1-a53b-ea1db4942db4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"kube-api-access-xrg27","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"route-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","command":["route-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-xrg27","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000580000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"route-controller-manager-sa","serviceAccount":"route-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c14"},"runAsNonRoot":true,"fsGroup":1000580000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"route-controller-manager","openshift-route-controller-manager-anti-affinity":"true","route-controller-manager":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:04:24Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:59Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:59Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.52","podIPs":[{"ip":"10.128.0.52"}],"startTime":"2026-02-17T15:03:48Z","containerStatuses":[{"name":"route-controller-manager","state":{"running":{"startedAt":"2026-02-17T15:08:35Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:35.691827 1 cmd.go:240] Using service-serving-cert provided certificates\nI0217 15:07:35.692036 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:35.692521 1 observer_polling.go:159] Starting file observer\nI0217 15:07:35.693170 1 builder.go:298] route-controller-manager version 4.18.0-202601181315.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3\nI0217 15:07:35.694021 1 dynamic_serving_content.go:113] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0217 15:08:06.162167 1 cmd.go:169] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-route-controller-manager/leases/openshift-route-controllers\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:35Z","finishedAt":"2026-02-17T15:08:06Z","containerID":"cri-o://533491bcdd7a1e81be78b60edc3ff96d870551db82df44a567112342369f625f"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","containerID":"cri-o://8c91e52c0bffd71b1d402b7407e49fa1b2b0ea7c5b17f48e1de871ae6836ffa4","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-xrg27","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}operator-controller-controller-manager-85c9b89969-4n2ls.json0000640000000000000000000002473715145102765032165 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-85c9b89969-4n2ls","generateName":"operator-controller-controller-manager-85c9b89969-","namespace":"openshift-operator-controller","uid":"50c51fe2-32aa-430f-8da0-7cf3b9519131","resourceVersion":"8499","creationTimestamp":"2026-02-17T15:03:23Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"85c9b89969"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.39/23\"],\"mac_address\":\"0a:58:0a:80:00:27\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.39/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.39\"\n ],\n \"mac\": \"0a:58:0a:80:00:27\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-85c9b89969","uid":"56f910fd-e781-4e88-945e-ef7db37a6fb5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-8g48f","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-8g48f","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-8g48f","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:25Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:25Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.39","podIPs":[{"ip":"10.128.0.39"}],"startTime":"2026-02-17T15:03:23Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-17T15:03:37Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://d2819b5ec7544398c667e332b7fb3d2d85cf71bbbb7f6160fcca20bd85436f17","started":true,"volumeMounts":[{"name":"kube-api-access-8g48f","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-17T15:07:18Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"community-operators\" reconcileID=\"11c194e1-cc47-44f3-b40b-131d278247db\"\nI0217 15:03:54.673250 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"11c194e1-cc47-44f3-b40b-131d278247db\"\nI0217 15:03:54.725653 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"a2b00170-18b3-49a9-bb82-7d557c8fc2e6\"\nI0217 15:03:54.725706 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"a2b00170-18b3-49a9-bb82-7d557c8fc2e6\"\nE0217 15:04:37.764968 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0217 15:05:37.768368 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0217 15:05:50.761721 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0217 15:05:50.761828 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0217 15:05:50.761879 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\n","startedAt":"2026-02-17T15:03:37Z","finishedAt":"2026-02-17T15:05:50Z","containerID":"cri-o://c1a7bb61a118b809395aec1f33f427a3425dcd9dc3136b6302e76b1e5de619e7"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","containerID":"cri-o://e78076928670aead1e74a90bfe18141b9748ba5b397af907cd88d6d09ee87278","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8g48f","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-6fcf4c966-l24cg.json0000640000000000000000000002326015145102765025263 0ustar0000000000000000{"metadata":{"name":"network-operator-6fcf4c966-l24cg","generateName":"network-operator-6fcf4c966-","namespace":"openshift-network-operator","uid":"4fd2c79d-1e10-4f09-8a33-c66598abc99a","resourceVersion":"8936","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"name":"network-operator","pod-template-hash":"6fcf4c966"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-6fcf4c966","uid":"ff677323-64f7-4613-96d8-f5f955272944","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-mgwfb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67d1623cf33e4a5ecaa5ec7f1dae3af4e0e0478489b3a628de2062dca1473c7e"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67d61d27aa46f8c1f49f2f691ebeec6a8465c1506c83e876415fcf6be19c2d77"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae9731fa23b96fe0a08e198d4cab6bb4e4b81a006a45b1e68948ffcac4e0bf9c"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7862391b6b069f985d3ba652ff80f29fedce94493a013b8e464e2d7bde964da4"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a913cef121c9a6c3ddc57b01fc807bb042e5a903489c05f99e6e2da9e6ec0b98"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mgwfb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:01:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:01:12Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:00:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:01:12Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-02-17T15:09:02Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:06:43.894719 1 cmd.go:250] Using service-serving-cert provided certificates\nI0217 15:06:43.894897 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:06:43.895350 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.073995 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps network-operator-6fcf4c966)\nI0217 15:08:18.075079 1 builder.go:298] network-operator version 4.18.0-202601171847.p2.gf63a7ff.assembly.stream.el9-f63a7ff-f63a7ffb316c9ca4359210ff5ea2c003dbe2d6a9\nF0217 15:08:48.686173 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-operator/leases/network-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:06:43Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://6d9a92eb2e644f956d98f7c0c8da65baf4f27d9eba13c8c64b77e173d1e323c4"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","containerID":"cri-o://3d42744bc55ffdd0ef5a58be1827ed2cd005681379705cfa9b05d7d0639649ee","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mgwfb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-xwftw.json0000640000000000000000000002463315145102765026060 0ustar0000000000000000{"metadata":{"name":"network-node-identity-xwftw","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"7c6b911d-8db2-48e8-bce9-d4bcde1f55a0","resourceVersion":"8472","creationTimestamp":"2026-02-17T15:01:49Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"69d96c74cb","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"4fa3be14-143d-49dc-9cd4-736a268175da","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-cpq86","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cpq86","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cpq86","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:01:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:01:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:01:49Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-02-17T15:05:35Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"kmprm\"} reason=\"CSRApproved\"\nI0217 15:02:20.649012 1 approver.go:230] Finished syncing CSR csr-kmprm for master-0 node in 9.953799ms\nI0217 15:02:20.649251 1 approver.go:230] Finished syncing CSR csr-kmprm for unknown node in 107.532µs\nI0217 15:02:20.658882 1 approver.go:230] Finished syncing CSR csr-kmprm for unknown node in 105.763µs\nI0217 15:02:25.976202 1 recorder.go:104] \"CSR \\\"csr-t2trz\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-t2trz\"} reason=\"CSRApproved\"\nI0217 15:02:25.982084 1 approver.go:230] Finished syncing CSR csr-t2trz for master-0 node in 6.366063ms\nI0217 15:02:25.982214 1 approver.go:230] Finished syncing CSR csr-t2trz for unknown node in 67.412µs\nI0217 15:02:25.995937 1 approver.go:230] Finished syncing CSR csr-t2trz for unknown node in 79.642µs\nE0217 15:04:23.016662 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE0217 15:04:38.016907 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0217 15:04:38.016970 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0217 15:04:53.017381 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0217 15:04:53.017598 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-02-17T15:02:07Z","finishedAt":"2026-02-17T15:04:53Z","containerID":"cri-o://55d3b1057ac7a6ad2c1bad42aa92f8880f4cec28c612f7db8db1627fa4374902"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://be8f29548cec98725a9fe2f2e764da4e1fd8b3547c172ac45765b13bbbf51c52","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cpq86","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-02-17T15:02:07Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://c29a0045f98de0eaf7f82dbc4073260459c891479eaa5f5615d8d6bc94e6b3a2","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-cpq86","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615145102765026265 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"f67aa67a-084a-48ce-96ba-6bddbd414671","resourceVersion":"3961","creationTimestamp":"2026-02-17T15:02:01Z","annotations":{"kubernetes.io/config.hash":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.mirror":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.seen":"2026-02-17T15:00:08.620331632Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"0094b69a-edfe-40b7-b76a-0bab854d0992","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:47Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:02:47Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-17T15:00:13Z","finishedAt":"2026-02-17T15:00:13Z","containerID":"cri-o://b7bba1848d8e5849cd7385799efab8edc5b4febf88a3e8ee8efae1fdf0ca6b20"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://b7bba1848d8e5849cd7385799efab8edc5b4febf88a3e8ee8efae1fdf0ca6b20","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-17T15:00:55Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0217 15:00:28.142659 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0217 15:00:28.142774 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0217 15:00:28.143847 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-02-17T15:00:28Z","finishedAt":"2026-02-17T15:00:28Z","containerID":"cri-o://7ee371ff3fea654567b16adfcbd47a6ebbd168a2f1e33c4562b559cfe498844a"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://518b836a67d98b0cf5a2e8d843574e61038c30a6058fcd6123417dc9c4975d78","started":true}],"qosClass":"Burstable"}}kube-storage-version-migrator-operator-cd5474998-tckph.json0000640000000000000000000001641415145102765035661 0ustar0000000000000000config/pod/openshift-kube-storage-version-migrator-operator{"metadata":{"name":"kube-storage-version-migrator-operator-cd5474998-tckph","generateName":"kube-storage-version-migrator-operator-cd5474998-","namespace":"openshift-kube-storage-version-migrator-operator","uid":"0c58265d-32fb-4cf0-97d8-6c9a5d37fad9","resourceVersion":"9515","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"kube-storage-version-migrator-operator","pod-template-hash":"cd5474998"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-storage-version-migrator-operator-cd5474998","uid":"670f9aec-70ec-47b8-a557-8c52a8094674","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"kube-api-access-gxjqf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-storage-version-migrator-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","command":["cluster-kube-storage-version-migrator-operator","start"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gxjqf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1001,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-storage-version-migrator-operator","serviceAccount":"kube-storage-version-migrator-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c14"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:14Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:14Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-storage-version-migrator-operator","state":{"running":{"startedAt":"2026-02-17T15:09:14Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.057210 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.057440 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.061636 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.302213 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-storage-version-migrator-operator-cd5474998)\nI0217 15:08:18.302752 1 builder.go:304] openshift-kube-storage-version-migrator-operator version 4.18.0-202601170513.p2.g59ba356.assembly.stream.el9-59ba356-59ba356f50ea3128905ffdb7137f868aa0588bab\nF0217 15:08:48.718708 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-storage-version-migrator-operator/leases/openshift-kube-storage-version-migrator-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:17Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://f39a2941da8acf9c022d9ee8fee7bd53fe9f2ec2201845d6f776f31736d87bf2"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","containerID":"cri-o://8c3de091b26b63488ddbcb0fd31c122edf5d7a587d35c169e265f4e9d06987b5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gxjqf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-controller-manager-operator-78ff47c7c5-xvzq9.json0000640000000000000000000001674115145102765033543 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-78ff47c7c5-xvzq9","generateName":"kube-controller-manager-operator-78ff47c7c5-","namespace":"openshift-kube-controller-manager-operator","uid":"553d4535-9985-47e2-83ee-8fcfb6035e7b","resourceVersion":"9635","creationTimestamp":"2026-02-17T15:00:45Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"78ff47c7c5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-78ff47c7c5","uid":"28cc336e-10a3-4bf6-9315-b5ba1a4c5c2d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffa02bd6af0b44d4955aba57f727e13671f503393926be6d8965e31dcfcd6e3c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-02-17T15:09:17Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:07:18.877867 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:07:18.878031 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:07:18.879085 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.897907 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps kube-controller-manager-operator-78ff47c7c5)\nI0217 15:08:18.898262 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601161039.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb\nF0217 15:08:49.045172 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:07:18Z","finishedAt":"2026-02-17T15:08:49Z","containerID":"cri-o://13fd27ae7e51b2ce5e96bcf2c8231506a7b48822721ae68c680d8a96bd1e5103"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","containerID":"cri-o://e5a73638e40c519ad84123382ac658619b9dc2d362942e0bd81784b6f5c9f036","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-c588d8cb4-nclxg.json0000640000000000000000000002431115145102765025417 0ustar0000000000000000{"metadata":{"name":"ingress-operator-c588d8cb4-nclxg","generateName":"ingress-operator-c588d8cb4-","namespace":"openshift-ingress-operator","uid":"22a30079-d7fc-49cf-882e-1c5022cb5bf6","resourceVersion":"11234","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"name":"ingress-operator","pod-template-hash":"c588d8cb4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-c588d8cb4","uid":"7060cec7-da2b-4cae-9183-2108c1843b28","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-bh874","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-bh874","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-bh874","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:13:32Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:13:32Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-02-17T15:13:31Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Event ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0217 15:13:08.363667 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.ConfigMap ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0217 15:13:08.363719 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.ConfigMap ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0217 15:13:08.363832 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Role ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-17T15:13:08.363Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\nW0217 15:13:08.364048 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Pod ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-17T15:13:08.364Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\n2026-02-17T15:13:08.364Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-02-17T15:13:08.364Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-02-17T15:13:08.365Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-02-17T15:11:07Z","finishedAt":"2026-02-17T15:13:08Z","containerID":"cri-o://bbb9d291b17c271b0bfc02764b8ad63a5a4d80141787014fe49630e60a725084"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","containerID":"cri-o://e6e0c56b68d88e13c98f68fd19514701fbb95e0c18c904b865481a0f5ad00f23","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-bh874","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-17T15:03:37Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://d93b40433fb9724e1f5467feb33fb43b6ecba885ae346a6f96e425da8156ece5","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-bh874","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-5f5f84757d-dsfkk.json0000640000000000000000000001661515145102765033612 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-5f5f84757d-dsfkk","generateName":"openshift-controller-manager-operator-5f5f84757d-","namespace":"openshift-controller-manager-operator","uid":"c7ed6ff7-56ba-4806-9e09-b8ae6d79cfda","resourceVersion":"9532","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"5f5f84757d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-5f5f84757d","uid":"37f81c5a-4233-4abd-9ffb-6ce07f3d467d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-8xbnc","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8xbnc","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c15"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-02-17T15:09:16Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0217 15:06:43.848083 1 cmd.go:253] Using service-serving-cert provided certificates\nI0217 15:06:43.848247 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0217 15:06:43.849004 1 observer_polling.go:159] Starting file observer\nW0217 15:08:18.058452 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-controller-manager-operator-5f5f84757d)\nI0217 15:08:18.058826 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202601170315.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0217 15:08:48.374774 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-17T15:06:43Z","finishedAt":"2026-02-17T15:08:48Z","containerID":"cri-o://81aaf4a8e92ad8167ce2d8a4500268568ecd4d12b11466d397ae290644672b32"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","containerID":"cri-o://afb6acf2a5178774fc88b9857020ac3a9778d76f3535d0f37b9711d4fea47c48","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8xbnc","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-74b6595c6d-q4766.json0000640000000000000000000001403715145102765030047 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-74b6595c6d-q4766","generateName":"csi-snapshot-controller-74b6595c6d-","namespace":"openshift-cluster-storage-operator","uid":"129dba1e-73df-4ea4-96c0-3eba78d568ba","resourceVersion":"8924","creationTimestamp":"2026-02-17T15:02:58Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"74b6595c6d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.28/23\"],\"mac_address\":\"0a:58:0a:80:00:1c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.28/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.28\"\n ],\n \"mac\": \"0a:58:0a:80:00:1c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-74b6595c6d","uid":"412b8e47-40f5-4448-aa4d-523c61bf8d62","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-rbmb9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-rbmb9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000160000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsNonRoot":true,"fsGroup":1000160000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:58Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.28","podIPs":[{"ip":"10.128.0.28"}],"startTime":"2026-02-17T15:02:58Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-02-17T15:08:58Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0217 15:08:00.663910 1 feature_gate.go:387] feature gates: {map[]}\nI0217 15:08:00.664218 1 main.go:169] Version: 68a18d7e135100109ca9e677bea11f9ad9d000e5\nI0217 15:08:00.666380 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0217 15:08:30.668371 1 main.go:109] Failed to list v1 volumesnapshotcontents with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshotcontents?limit=1\": context deadline exceeded\nE0217 15:08:30.668492 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-02-17T15:08:00Z","finishedAt":"2026-02-17T15:08:30Z","containerID":"cri-o://39e5d190c1de962c17b93f9f892d9c95fb301c2b359b235051f10e8c679da55c"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","containerID":"cri-o://ef80e89f464f2fddabc8382f1aaea540a66323e02f01f8d399ba62bafcf783cc","started":true,"volumeMounts":[{"name":"kube-api-access-rbmb9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-ff6c9b66-k8xp8.json0000640000000000000000000002057515145102765031705 0ustar0000000000000000{"metadata":{"name":"cluster-node-tuning-operator-ff6c9b66-k8xp8","generateName":"cluster-node-tuning-operator-ff6c9b66-","namespace":"openshift-cluster-node-tuning-operator","uid":"071566ae-a9ae-4aa9-9dc3-38602363be72","resourceVersion":"8592","creationTimestamp":"2026-02-17T15:00:44Z","labels":{"name":"cluster-node-tuning-operator","pod-template-hash":"ff6c9b66"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-node-tuning-operator-ff6c9b66","uid":"fa7e80df-0b2c-4a08-b793-7aebc9f437a3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-tuning-operator-tls","secret":{"secretName":"node-tuning-operator-tls","defaultMode":420}},{"name":"apiservice-cert","secret":{"secretName":"performance-addon-operator-webhook-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-hrh2k","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-node-tuning-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","command":["cluster-node-tuning-operator"],"args":["-v=0"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"RESYNC_PERIOD","value":"600"},{"name":"CLUSTER_NODE_TUNED_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-hrh2k","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"readOnlyRootFilesystem":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-node-tuning-operator","serviceAccount":"cluster-node-tuning-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c0"},"runAsUser":499,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:08:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:02:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-02-17T15:02:36Z","containerStatuses":[{"name":"cluster-node-tuning-operator","state":{"running":{"startedAt":"2026-02-17T15:08:54Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"hift.io\",\"controllerKind\":\"PerformanceProfile\",\"source\":\"kind source: *v1.Profile\"}\n{\"level\":\"info\",\"ts\":\"2026-02-17T15:03:36Z\",\"msg\":\"Starting Controller\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\"}\nI0217 15:03:36.962962 1 controller.go:1443] started events processor/controller\nI0217 15:03:36.992835 1 server.go:104] starting metrics server\nI0217 15:03:37.009753 1 controller.go:653] created profile master-0 [openshift-control-plane]\n{\"level\":\"info\",\"ts\":\"2026-02-17T15:03:37Z\",\"msg\":\"Starting workers\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"worker count\":1}\nE0217 15:05:10.883130 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0217 15:06:10.884879 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io node-tuning-operator-lock)\nE0217 15:07:44.890408 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0217 15:08:36.878914 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-node-tuning-operator/leases/node-tuning-operator-lock\": context deadline exceeded\nI0217 15:08:36.879014 1 leaderelection.go:297] failed to renew lease openshift-cluster-node-tuning-operator/node-tuning-operator-lock: timed out waiting for the condition\nF0217 15:08:54.397538 1 main.go:242] manager exited with non-zero code: leader election lost\n","startedAt":"2026-02-17T15:03:36Z","finishedAt":"2026-02-17T15:08:54Z","containerID":"cri-o://8a4a98b1318c509e5f82636085aeb117a7034201fd28d56b542c5883530a6144"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","containerID":"cri-o://4c47c374b75591c1874c057cb8609aad6e1b60685643b76979aadb8e2ca53712","started":true,"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-hrh2k","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c.json0000640000000000000000000003031615145102765035632 0ustar0000000000000000config/pod/openshift-cloud-controller-manager-operator{"metadata":{"name":"cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c","generateName":"cluster-cloud-controller-manager-operator-6fb8ffcd9b-","namespace":"openshift-cloud-controller-manager-operator","uid":"14723cb7-2d96-42b7-b559-70386c4c841c","resourceVersion":"11177","creationTimestamp":"2026-02-17T15:10:02Z","labels":{"k8s-app":"cloud-manager-operator","pod-template-hash":"6fb8ffcd9b"},"annotations":{"kubectl.kubernetes.io/default-container":"cluster-cloud-controller-manager"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-cloud-controller-manager-operator-6fb8ffcd9b","uid":"aea58a1c-c6f8-4a56-b3b0-14a10e58e056","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"images","configMap":{"name":"cloud-controller-manager-images","defaultMode":420}},{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"cloud-controller-manager-operator-tls","secret":{"secretName":"cloud-controller-manager-operator-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-7lw7x","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-cloud-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n URL_ONLY_KUBECONFIG=/etc/kubernetes/kubeconfig\nfi\nexec /cluster-controller-manager-operator \\\n--leader-elect=true \\\n--leader-elect-lease-duration=137s \\\n--leader-elect-renew-deadline=107s \\\n--leader-elect-retry-period=26s \\\n--leader-elect-resource-namespace=openshift-cloud-controller-manager-operator \\\n\"--images-json=/etc/cloud-controller-manager-config/images.json\" \\\n--metrics-bind-address=127.0.0.1:9257 \\\n--health-addr=127.0.0.1:9259\n"],"ports":[{"name":"metrics","hostPort":9257,"containerPort":9257,"protocol":"TCP"},{"name":"healthz","hostPort":9259,"containerPort":9259,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/cloud-controller-manager-config/"},{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"kube-api-access-7lw7x","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"config-sync-controllers","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n URL_ONLY_KUBECONFIG=/etc/kubernetes/kubeconfig\nfi\nexec /config-sync-controllers \\\n--leader-elect=true \\\n--leader-elect-lease-duration=137s \\\n--leader-elect-renew-deadline=107s \\\n--leader-elect-retry-period=26s \\\n--leader-elect-resource-namespace=openshift-cloud-controller-manager-operator \\\n--health-addr=127.0.0.1:9260\n"],"ports":[{"name":"healthz","hostPort":9260,"containerPort":9260,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"25Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"kube-api-access-7lw7x","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9258","--upstream=http://127.0.0.1:9257/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9258,"containerPort":9258,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"cloud-controller-manager-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-7lw7x","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-cloud-controller-manager","serviceAccount":"cluster-cloud-controller-manager","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"cluster-cloud-controller-manager-dockercfg-dkdg8"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.cloudprovider.kubernetes.io/uninitialized","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:10:05Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:10:02Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:10:50Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-rbac-proxy]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:10:50Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-rbac-proxy]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:10:02Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:10:02Z","containerStatuses":[{"name":"cluster-cloud-controller-manager","state":{"running":{"startedAt":"2026-02-17T15:10:04Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","containerID":"cri-o://7b0bc73a19929878c76a20f8913258b82b0659b1d457e21ec06a82cf6b136195","started":true,"volumeMounts":[{"name":"images","mountPath":"/etc/cloud-controller-manager-config/"},{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7lw7x","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"config-sync-controllers","state":{"running":{"startedAt":"2026-02-17T15:10:04Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","containerID":"cri-o://426e84564cdde730130665e18be2c56771ee413958b73511ab6a3d57c4226dd6","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7lw7x","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"waiting":{"reason":"CrashLoopBackOff","message":"back-off 2m40s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-6fb8ffcd9b-v7m7c_openshift-cloud-controller-manager-operator(14723cb7-2d96-42b7-b559-70386c4c841c)"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"AG: --skip-log-headers=\"false\"\nI0217 15:12:55.778395 1 flags.go:64] FLAG: --stderrthreshold=\"\"\nI0217 15:12:55.778398 1 flags.go:64] FLAG: --tls-cert-file=\"/etc/tls/private/tls.crt\"\nI0217 15:12:55.778402 1 flags.go:64] FLAG: --tls-cipher-suites=\"[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]\"\nI0217 15:12:55.778416 1 flags.go:64] FLAG: --tls-min-version=\"VersionTLS12\"\nI0217 15:12:55.778421 1 flags.go:64] FLAG: --tls-private-key-file=\"/etc/tls/private/tls.key\"\nI0217 15:12:55.778426 1 flags.go:64] FLAG: --tls-reload-interval=\"1m0s\"\nI0217 15:12:55.778432 1 flags.go:64] FLAG: --upstream=\"http://127.0.0.1:9257/\"\nI0217 15:12:55.778436 1 flags.go:64] FLAG: --upstream-ca-file=\"\"\nI0217 15:12:55.778440 1 flags.go:64] FLAG: --upstream-client-cert-file=\"\"\nI0217 15:12:55.778444 1 flags.go:64] FLAG: --upstream-client-key-file=\"\"\nI0217 15:12:55.778448 1 flags.go:64] FLAG: --upstream-force-h2c=\"false\"\nI0217 15:12:55.778452 1 flags.go:64] FLAG: --v=\"3\"\nI0217 15:12:55.778488 1 flags.go:64] FLAG: --version=\"false\"\nI0217 15:12:55.778493 1 flags.go:64] FLAG: --vmodule=\"\"\nW0217 15:12:55.778507 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0217 15:12:55.778517 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml\nI0217 15:12:55.779361 1 kube-rbac-proxy.go:233] Valid token audiences: \nI0217 15:12:55.784195 1 kube-rbac-proxy.go:347] Reading certificate files\nE0217 15:12:55.784386 1 run.go:72] \"command failed\" err=\"failed to initialize certificate reloader: error loading certificates: error loading certificate: open /etc/tls/private/tls.crt: no such file or directory\"\n","startedAt":"2026-02-17T15:12:55Z","finishedAt":"2026-02-17T15:12:55Z","containerID":"cri-o://d42cd385a169cd36ec041c3a6e5a8a617ea41d6c13c8210a911ad86286cc0ade"}},"ready":false,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://d42cd385a169cd36ec041c3a6e5a8a617ea41d6c13c8210a911ad86286cc0ade","started":false,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"cloud-controller-manager-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-7lw7x","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-67bc7c997f-jdfsm.json0000640000000000000000000002537515145102765026037 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-67bc7c997f-jdfsm","generateName":"catalogd-controller-manager-67bc7c997f-","namespace":"openshift-catalogd","uid":"68954d1e-2147-4465-9817-a3c04cbc19b0","resourceVersion":"8500","creationTimestamp":"2026-02-17T15:03:20Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"67bc7c997f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.36/23\"],\"mac_address\":\"0a:58:0a:80:00:24\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.36/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.36\"\n ],\n \"mac\": \"0a:58:0a:80:00:24\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-67bc7c997f","uid":"072d8a8f-5072-4cd0-9501-28538aa24660","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-4lwz4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-4lwz4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-4lwz4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:23Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:20Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:31Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:07:31Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:03:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.36","podIPs":[{"ip":"10.128.0.36"}],"startTime":"2026-02-17T15:03:20Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-17T15:03:22Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://2a479ec38bdea4cbd4a7adb238b324911587886dcefb4e0f842be74e764e51d4","started":true,"volumeMounts":[{"name":"kube-api-access-4lwz4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-17T15:07:18Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"eout: request did not complete within requested timeout - context deadline exceeded\n \u003e controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"04ded6c5-f757-4bcf-b87e-7de645431d5e\"\nI0217 15:05:36.810618 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"ff127877-4904-4f36-b14a-81394222c69c\"\nI0217 15:05:36.810666 1 clustercatalog_controller.go:208] \"unpack required: no cached catalog metadata found for this catalog\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"ff127877-4904-4f36-b14a-81394222c69c\"\nI0217 15:05:36.810719 1 main.go:250] \"using available authentication information for pulling image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"ff127877-4904-4f36-b14a-81394222c69c\"\nE0217 15:05:49.299051 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0217 15:06:02.287405 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0217 15:06:02.287656 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-17T15:03:23Z","finishedAt":"2026-02-17T15:06:02Z","containerID":"cri-o://e039cb4463938f81d7404a930ef7ab4b00269f6ed6b9151f252951ea9d381dc4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","containerID":"cri-o://60c37bbe21721a193105735329bdb72d13d00d18b75bdb6198c01ec145d996cc","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-4lwz4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-version/cluster-version-operator-649c4f5445-7kdb7.json0000640000000000000000000001351015145102765026501 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-649c4f5445-7kdb7","generateName":"cluster-version-operator-649c4f5445-","namespace":"openshift-cluster-version","uid":"626c4f7a-59ee-45da-9198-05dd2c42ac42","resourceVersion":"9679","creationTimestamp":"2026-02-17T15:09:17Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"649c4f5445"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-649c4f5445","uid":"8c2ae6b8-6170-4565-b097-2454a714531b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"imagePullSecrets":[{"name":"default-dockercfg-fg558"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:17Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:18Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:18Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-17T15:09:17Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-17T15:09:17Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-17T15:09:18Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","containerID":"cri-o://98474fa2fe73c4db5804824208857baff7e2d6a53dfa4d32d3b7d0f00e99e897","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415145102765011030 0ustar0000000000000000ba8fa6d1-ecee-405e-a25e-db56aa7ca5f0config/version.json0000640000000000000000000000700115145102765013071 0ustar0000000000000000{"metadata":{"name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","resourceVersion":"12144","generation":2,"creationTimestamp":"2026-02-17T14:55:44Z"},"spec":{"clusterID":"ba8fa6d1-ecee-405e-a25e-db56aa7ca5f0","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","url":"https://access.redhat.com/errata/RHSA-2026:1062","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-17T14:56:08Z","completionTime":null,"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","verified":false}],"observedGeneration":2,"versionHash":"mWssvFsfzgI=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-17T14:56:08Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-17T14:56:08Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-17T14:56:08Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-17T14:56:08Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T14:56:08Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-02-17T15:09:51Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, etcd, image-registry, kube-apiserver, kube-controller-manager, kube-scheduler, monitoring, openshift-apiserver, openshift-controller-manager, openshift-samples, operator-lifecycle-manager-packageserver are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 906): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 906): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (823 of 906): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (827 of 906): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T14:56:08Z","reason":"MultipleErrors","message":"Unable to apply 4.18.32: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/clusteroperator/storage.json0000640000000000000000000000346715145102765016321 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"2e61eb79-2711-43f9-b380-8006de5854cf","resourceVersion":"10282","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315145102765016664 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"3776dbba-58af-415e-bc1b-e00b6d619a68","resourceVersion":"5035","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:05Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:01Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:01Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000305215145102765024663 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"5293f28a-a061-49c4-a9dc-aa9b15416bd9","resourceVersion":"12182","generation":1,"creationTimestamp":"2026-02-17T14:56:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: InstallCheckFailed, message: install timeout"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:14:41Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:38Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515145102765023462 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"1bf6dc9f-cd42-4ca1-af7f-9f7c676cc5d9","resourceVersion":"8531","generation":1,"creationTimestamp":"2026-02-17T14:56:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:08:37Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115145102765022046 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"6bc6de63-b694-4d5a-a585-57c85698e14a","resourceVersion":"6737","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315145102765020310 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"045d9b56-463c-45f7-acb7-0441e0c4f621","resourceVersion":"814","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346215145102765022440 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"4a5302a4-b2e5-4128-8d7b-9f7fed510054","resourceVersion":"12158","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:14:37Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:14:37Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:05Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215145102765020642 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"27466ce2-93aa-4053-a9a9-7660344b5e35","resourceVersion":"8032","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:46Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"openshift-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415145102765015433 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"7de8b071-baf0-45e8-8433-01a1ea318d98","resourceVersion":"7558","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:10Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:45Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:45Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:10Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:03:10Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115145102765017072 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"aa2fc8d7-4870-455d-aa7c-94db0e8440dc","resourceVersion":"7157","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:38Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.32\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:40Z","reason":"AsExpected","message":"Cluster version is \"4.18.32\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614415145102765016344 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"8242e933-c445-4414-b5be-4b9e782731d5","resourceVersion":"11391","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-17T15:01:30Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:01:19Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:01:19Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:13:47Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:02:43Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715145102765017036 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"571b448d-1c10-42d2-9d06-f4c9d4b76182","resourceVersion":"6673","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-02-17T15:03:37Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315145102765017133 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"a4b585ac-3b85-41dd-b016-55892cbfce5e","resourceVersion":"6701","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.32"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000546315145102765017522 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"0e683dd7-abc2-438f-b8b4-dadf445fe3e3","resourceVersion":"10730","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:10:07Z","message":"Cluster version is 4.18.32"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:10:07Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:10:07Z","reason":"AsExpected","message":"Cluster has deployed [{operator 4.18.32} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42}]"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:10:07Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-17T15:10:07Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-df68dbacb4242702506774288173e62e","worker":"all 0 nodes are at latest configuration rendered-worker-9756454e8727157d80899d278483e5d2"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253315145102765020106 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"d656bd79-6c46-4bce-ba86-07acf2c02328","resourceVersion":"11710","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:14:09Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.32"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:14:09Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:14:09Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:14:09Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415145102765017023 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"80cad6af-06d5-4344-bdc5-1bb0f687fb12","resourceVersion":"11640","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:14:02Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:14:02Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:14:02Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:14:02Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315145102765022543 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"eef5d95f-ab0c-4402-9934-bb5c6acf5260","resourceVersion":"4864","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000430515145102765017547 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"c66a562b-66a9-4132-aa18-c6766ccdda70","resourceVersion":"12288","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:15Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"operator","version":"4.18.32"},{"name":"kube-scheduler","version":"1.31.14"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000441615145102765021367 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"6c603bad-c35a-45c1-a392-050fc5929f72","resourceVersion":"12316","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:14:56Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 2; 0 nodes have achieved new revision 3"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:14:47Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 2; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"kube-controller-manager","version":"1.31.14"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000520015145102765017564 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"093c5535-560d-498e-9245-22b8474e35ad","resourceVersion":"12153","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:02:39Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:33Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:02:40Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:39Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-17T15:02:39Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000562515145102765016503 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"9d85e2f7-e13f-4b22-91d2-8508acec3bbb","resourceVersion":"10938","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"False","lastTransitionTime":"2026-02-17T15:11:15Z","reason":"NoClusterTransfer","message":"no available cluster transfer"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"True","lastTransitionTime":"2026-02-17T15:11:15Z","reason":"Updated","message":"SCA certs successfully updated in the etc-pki-entitlement secret"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:09:44Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":"2026-02-17T15:11:14Z"}}}config/clusteroperator/ingress.json0000640000000000000000000000467715145102765016333 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"8502ebfb-1e52-4ee1-9851-365bbd239d56","resourceVersion":"10927","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:39Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:38Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715145102765017576 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"083ba522-81e4-4cfe-b2ac-389d2245b504","resourceVersion":"811","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000371015145102765015563 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"38aae85a-b6f1-4355-a7b0-d671760832db","resourceVersion":"12409","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-17T15:14:58Z","reason":"EtcdEndpoints_ErrorUpdatingEtcdEndpoints","message":"EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-17T15:03:17Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515145102765015440 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"4abeb2cc-6baa-4126-95cb-8390ecc25349","resourceVersion":"9606","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:17Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:17Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:17Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000322015145102765021434 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"fcee1738-0f9a-44a2-9808-8e1cd5b2965d","resourceVersion":"11437","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:13:50Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"csi-snapshot-controller","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515145102765021621 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"a01bfe9f-b09d-4472-bb45-77d32f70c2dd","resourceVersion":"9758","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:32Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:32Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:32Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:09:32Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215145102765016302 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"250d96eb-7210-44bb-8973-51ebd201b228","resourceVersion":"795","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615145102765017742 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"09030905-8c73-4268-b7e4-01c0416b41e0","resourceVersion":"8530","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:03:03Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015145102765020470 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"162639e6-5975-47a7-829e-238c9fe81a3a","resourceVersion":"11641","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:13:54Z","reason":"AsExpected","message":"at version 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:14:02Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:14:02Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:13:54Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022415145102765020061 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"a35bd9fd-5e05-4a65-bf68-0db0398efc05","resourceVersion":"11591","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:13:54Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:13:54Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:13:54Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:13:54Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440215145102765021542 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"7b54d445-6a0f-4dd1-b705-8c2e2154b8de","resourceVersion":"10294","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:09:48Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115145102765016603 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"f0d7bd9a-d8e3-4662-8859-f5047e8e9756","resourceVersion":"10105","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:09:41Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:09:41Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:09:41Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:09:41Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-17T15:09:41Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000727615145102765017676 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"48eb25d5-2b4b-4b03-9305-8ffbc6ef28ba","resourceVersion":"11479","generation":1,"creationTimestamp":"2026-02-17T14:56:08Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-17T15:13:43Z","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-17T15:03:50Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-17T15:03:00Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.180.229:443/healthz\": dial tcp 172.30.180.229:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-17T15:03:00Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-17T15:02:59Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"oauth-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515145102765023223 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115145102765025433 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715145102765025142 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715145102765025133 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000040415145102765022255 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515145102765026707 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115145102765023412 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115145102765023206 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115145102765025476 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/ingress_controllers_certs.json0000640000000000000000000000045715145102765017541 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-17T15:03:36Z","not_after":"2028-02-17T15:03:37Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-17T15:03:37Z","not_after":"2028-02-17T15:03:38Z","controllers":[]}]config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315145102765023450 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"2daf85bd-55e6-4eb1-be77-3c607c5d8d09","resourceVersion":"4230","generation":1,"creationTimestamp":"2026-02-17T15:02:58Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015145102765022053 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"aadcd42c-4aaa-4e99-ab5d-288877468c6e","resourceVersion":"4195","generation":1,"creationTimestamp":"2026-02-17T15:02:58Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-17T15:02:58Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002231415145102765025502 0ustar0000000000000000{"metadata":{"name":"edit","uid":"0153aae1-3336-4163-a363-49b1cc0a934c","resourceVersion":"11761","creationTimestamp":"2026-02-17T14:54:45Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002520115145102765025643 0ustar0000000000000000{"metadata":{"name":"admin","uid":"1fb756f5-14e9-4c4e-ba42-f14b5070fc6f","resourceVersion":"11771","creationTimestamp":"2026-02-17T14:54:45Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215145102765020202 0ustar0000000000000000[]config/node/master-0.json0000640000000000000000000000703115145102765013764 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"0094b69a-edfe-40b7-b76a-0bab854d0992","resourceVersion":"12359","creationTimestamp":"2026-02-17T15:00:43Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-df68dbacb4242702506774288173e62e","machineconfiguration.openshift.io/desiredConfig":"rendered-master-df68dbacb4242702506774288173e62e","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-df68dbacb4242702506774288173e62e","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-df68dbacb4242702506774288173e62e","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"10667","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-17T15:14:58Z","lastTransitionTime":"2026-02-17T15:00:43Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-17T15:14:58Z","lastTransitionTime":"2026-02-17T15:00:43Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-17T15:14:58Z","lastTransitionTime":"2026-02-17T15:00:43Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-17T15:14:58Z","lastTransitionTime":"2026-02-17T15:02:36Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.107.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202601202224-0","containerRuntimeVersion":"cri-o://1.31.13-3.rhaos4.18.gite0b87e5.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"runc","features":{"recursiveReadOnlyMounts":true}},{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}}]}}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515145102765025736 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"c5fe79b2-f099-4ff2-8c66-d2c3016beec7","resourceVersion":"11294","generation":2,"creationTimestamp":"2026-02-17T15:09:55Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115145102765025302 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"66b53f60-df1a-4b22-a31b-0be4c058c6b5","resourceVersion":"4963","generation":2,"creationTimestamp":"2026-02-17T14:56:36Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515145102765026741 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"3cb4f775-da5c-47d0-ac45-4b6ba1be74ce","resourceVersion":"6783","generation":1,"creationTimestamp":"2026-02-17T15:03:37Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"530cc9e8-1d21-4a3d-9030-6bae99c25263","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715145102765024027 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"d41531c7-1588-48ac-9407-45e80120c06e","resourceVersion":"4958","generation":2,"creationTimestamp":"2026-02-17T15:01:33Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"530cc9e8-1d21-4a3d-9030-6bae99c25263","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315145102765030642 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"baed781c-9295-4285-9b8b-8656b82b728a","resourceVersion":"11292","generation":2,"creationTimestamp":"2026-02-17T15:09:53Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215145102765032113 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"6b2edaa6-b9b3-400c-b70a-30a233e8cff1","resourceVersion":"11293","generation":2,"creationTimestamp":"2026-02-17T15:09:41Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715145102765025000 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"5ec3afbe-a930-4dbc-a2e6-8f896e118603","resourceVersion":"11524","generation":2,"creationTimestamp":"2026-02-17T15:13:54Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315145102765026504 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"8caf5750-4781-42fb-9a1e-c5da36073c53","resourceVersion":"11291","generation":2,"creationTimestamp":"2026-02-17T15:09:55Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}events/openshift-machine-api.json0000640000000000000000000000074315145102765015621 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-17T15:11:47Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-autoscaler-operator-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-17T15:11:50Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : secret \"machine-api-operator-tls\" not found","type":"Warning"}]}config/machineconfigpools/worker.json0000640000000000000000000001013515145102765016566 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-17T15:09:42Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10655","uid":"bd2f53b2-c8a8-4302-9fa7-524e1e3b77c3"},"spec":{"configuration":{"name":"rendered-worker-9756454e8727157d80899d278483e5d2","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-15T14:44:42Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-18T14:51:47Z","subject":"CN=kube-csr-signer_@1771340580"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-18T14:51:47Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-17T14:51:47Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-17T14:51:47Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-15T14:51:45Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-17T15:02:40Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1771340560"}],"conditions":[{"lastTransitionTime":"2026-02-17T15:09:57Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-02-17T15:10:02Z","message":"All nodes are updated with MachineConfig rendered-worker-9756454e8727157d80899d278483e5d2","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-02-17T15:10:02Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-02-17T15:10:02Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-02-17T15:10:02Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-worker-9756454e8727157d80899d278483e5d2","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":2,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001241015145102765016546 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-17T15:09:42Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10658","uid":"31e31006-613e-4b3c-9bbb-e88cf59939ce"},"spec":{"configuration":{"name":"rendered-master-df68dbacb4242702506774288173e62e","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-15T14:44:42Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-18T14:51:47Z","subject":"CN=kube-csr-signer_@1771340580"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-18T14:51:47Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-17T14:51:47Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-17T14:51:47Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-15T14:51:45Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-17T15:02:40Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1771340560"}],"conditions":[{"lastTransitionTime":"2026-02-17T15:09:58Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-02-17T15:10:02Z","message":"All nodes are updated with MachineConfig rendered-master-df68dbacb4242702506774288173e62e","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-02-17T15:10:02Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-02-17T15:10:02Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-02-17T15:10:02Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-master-df68dbacb4242702506774288173e62e","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":2,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/network.json0000640000000000000000000000117015145102765013076 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"f56d25c4-e548-437c-b18d-6c09af1c9c25","resourceVersion":"3243","generation":2,"creationTimestamp":"2026-02-17T14:55:39Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/schedulers/cluster.json0000640000000000000000000000052415145102765015231 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"e4dc6c19-1ee2-44e8-a960-8f7cee62bc01","resourceVersion":"562","generation":1,"creationTimestamp":"2026-02-17T14:55:41Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163315145102765027651 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2026-02-17T15:14:02Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}],"resourceVersion":"11647","uid":"c0eb879c-e44c-49c2-9cd3-92b5d2c0c6bf"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615145102765027504 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"2b0d8d72-9fab-4f8b-8eb5-5c4514322411","resourceVersion":"6027","generation":2,"creationTimestamp":"2026-02-17T15:03:20Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/authentication.json0000640000000000000000000000132415145102765014425 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5f2bee39-f5ae-4e35-9636-cb354d64139a","resourceVersion":"11474","generation":2,"creationTimestamp":"2026-02-17T14:56:16Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615145102765025127 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"561dd5f4-ddd1-4b09-83b6-3228b2e6701b","resourceVersion":"10181","generation":1,"creationTimestamp":"2026-02-17T14:56:25Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-02-17T15:09:43Z","reason":"SufficientPods","message":""}]}}config/infrastructure.json0000640000000000000000000000106515145102765014470 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"72d202a4-09bb-41f6-9127-efbcb868e18e","resourceVersion":"539","generation":1,"creationTimestamp":"2026-02-17T14:55:38Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/apiserver.json0000640000000000000000000000121615145102765013406 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"807fa2b2-9ee7-4b53-af89-d6f270e043ec","resourceVersion":"847","generation":1,"creationTimestamp":"2026-02-17T14:56:10Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/ingress.json0000640000000000000000000000043615145102765013063 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"41ad3130-65bd-49bf-87d4-ea9d4d6351d9","resourceVersion":"552","generation":1,"creationTimestamp":"2026-02-17T14:55:39Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/oauth.json0000640000000000000000000000114415145102765012526 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"3d32694a-033f-469e-942f-2f1e916e3ae1","resourceVersion":"1706","generation":1,"creationTimestamp":"2026-02-17T14:56:27Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115145102765027754 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"70396571-3eb2-4dbc-ae82-217ce96c7712","resourceVersion":"6747","generation":1,"creationTimestamp":"2026-02-17T15:03:37Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-17T15:03:37Z","reason":"AsExpected"}]}}config/proxy.json0000640000000000000000000000031315145102765012564 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"436b951d-afb3-4463-9226-9ab4b43d905e","resourceVersion":"555","generation":1,"creationTimestamp":"2026-02-17T14:55:40Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/featuregate.json0000640000000000000000000000613615145102765013710 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"708aac9a-6281-41dd-9fba-d624cbc07f0f","resourceVersion":"645","generation":1,"creationTimestamp":"2026-02-17T14:56:00Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.32","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/image.json0000640000000000000000000000111715145102765012470 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"8f92d81a-5e9e-40b6-9d18-144d36df036e","resourceVersion":"1539","generation":1,"creationTimestamp":"2026-02-17T14:56:25Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"f36cd93d-4638-4a84-b862-870f04c84d84"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}